This document presents a new, and just mitigated, technique to leverage the JIT-ed code to serve as an info leaker and therefore bypass the security mitigation ASLR.
e84ddee51625ea3026e889d9a332f82b1c3b784a10b937271f20b254640e07fb
TinyMCE Image Manager versions 1.1 and below suffer cross site scripting and remote shell upload vulnerabilities.
c4c3c25bb2e20196080641e3f82f29017c3102e1dca37abdab1c4328a6da5895
Flash exploit for Win7/IE9 that bypasses ASLR by spraying ROP info leak gadgets.
21ff973f2decc557bafa5724aaef1dde8c1ac3345e644fe4331701d3a4e9e176
Sybase EAServer versions 6.3.1 and below suffer from directory traversal, XML entity injection, and OS command execution vulnerabilities.
9a7fc5b427a418fe68dc14cad397d8ec6b9a5eb65ce69a35e2127e97aa52bf08
This code is a backdoor for nginx. It provides remote shell access, SOCKS5 tunneling, and HTTP password sniffing and logging.
8f754357b61c73fe20efc8dd28b52d222feb812bbaf36bebdfee47e30d0ddfb1
Debian Linux Security Advisory 2724-1 - Several vulnerabilities have been discovered in the Chromium web browser.
c56abdd979ad1791b0c97f5cbfe6e0aea3eb1051cb9ca106027b3fa6fbfd6a9d
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
99024c4c257f667711bc918ee0181bdb40f11548d6dc7e061564a5d5cbeae1f7
Xibo versions 1.2.2 and 1.4.1 suffer from a directory traversal vulnerability in index.php.
db13329517e01c436a20ea776614b0531a22176dc06910d6e651917d87fd33fc
Windows Movie Maker version 2.1.4026.0 crash proof of concept exploit.
77267103b3d7d65ebb1e4360830b516ec3bb795821bf678615837b551d5e6b04
Nginx versions 1.3.9 and 1.4.0 chunked encoding stack based buffer overflow exploit.
e568d34f409666b4b38b816f6e12c700985eef965d9935fab1764f2b9c979b77
This Metasploit module exploits a vulnerability found in Apple Quicktime. The flaw is triggered when Quicktime fails to properly handle the data length for certain atoms such as 'rdrf' or 'dref' in the Alis record, which may result a buffer overflow by loading a specially crafted .mov file, and allows arbitrary code execution under the context of the user.
15145b2469bd29030e19b5448ca2e224d6efff120fdd50fb770f210db2a4b736
This Metasploit module exploits an arbitrary file upload vulnerability on HP Managed Printing Administration 2.6.3 (and before). The vulnerability exists in the UploadFiles() function from the MPAUploader.Uploader.1 control, loaded and used by the server. The function can be abused via directory traversal and null byte injection in order to achieve arbitrary file upload.
6b9c2fdb66e0b18c5c373af45ca8b8d1347dba271986c98d13999847c6f76701
Debian Linux Security Advisory 2725-1 - Two security issues have been found in the Tomcat servlet and JSP engine.
76b85ff0d5e73cbb8122a1d6e4d0e53d836304cf9791d27b1dd78a04a28ceef8
Symantec Workspace Virtualization version 6.4.1895.0 local kernel mode privilege escalation exploit.
f34f6ca8bbdca39830d0989067fe1fd85f518a6ff01379b69ea72a1c01e5f5b9
HP Security Bulletin HPSBMU02900 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Local Denial of Service (DoS), remote Denial of Service (DoS), execution of arbitrary code, gain privileges, disclosure of information, unauthorized access, or XSS. Revision 1 of this advisory.
9864656a8c7f02f65287405b436e81a4bfb33db55bb9dbe7aea8240180e998a1
HP Security Bulletin HPSBST02896 2 - A potential security vulnerability has been identified with the HP StoreVirtual Storage. This vulnerability could be remotely exploited to gain unauthorized access to the device. All HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer. This functionality cannot be disabled today. HP StoreVirtual products are storage appliances that use a custom operating system, LeftHand OS, which is not accessible to the end user. Limited access is available to the user via the HP StoreVirtual Command-Line Interface (CLiQ) however root access is blocked. Root access may be requested by HP Support in some cases to help customers resolve complex support issues. To facilitate these cases, a challenge-response-based one-time password utility is employed by HP Support to gain root access to systems when the customer has granted permission and network access to the system. The one-time password utility protects the root access by preventing repeated access to the system with the same pass phrase. Root access to the LeftHand OS does not provide access to the user data being stored on the system. Revision 2 of this advisory.
e39626a882fac82518af8405435038f5279f1f206d95e388f032ec3a0a67d197
WordPress WooCommerce version 2.0.12 suffers from a persistent cross site scripting vulnerability.
57d7189e7893db13f998b57e482f7f386bd27a5aca10ffb821839d7f9bf89a5f
Drupal Hostmaster third party module version 6.x suffers from an access bypass vulnerability.
029ae096eab1d32c2fdce40b827087a83a9a993ec8dd7ca249ba58232224eba4
Cisco Security Advisory - Cisco Intrusion Prevention System (IPS) Software is affected by multiple denial of service vulnerabilities. Customers running a vulnerable version of the Cisco IDSM-2 Module should refer to the "Workarounds" section of this advisory for available mitigations. Workarounds that mitigate the Cisco IPS Software Fragmented Traffic Denial of Service Vulnerability and Cisco IDSM-2 Malformed TCP Packets Denial of Service Vulnerability are available.
8f827a747809b4b88d7227babf5e52be7838679b0e8ecb6655d3111b7dafa0a1
Roundcube Webmail version 0.9.2 suffers from a cross site scripting vulnerability.
63d09fabc0afbeb3b88708f8ea18b1e43d41a4e9021017ca8052bcdb3521dec6
Security Explorations has submitted a new vulnerability to Oracle that implements a classic attack against Java VM.
06b801519ec428ee719f86858e50021889fbd7008bbcfe62c1df7a749f41a4e1
Dell PacketTrap PSA version 7.1 suffers from multiple cross site scripting vulnerabilities.
bf0b266ef4f6fd353ad738b5f63250382aa534a5a379b1fe6feb16487668febc
Dell PacketTrap MSP RMM version 6.6.x suffers from multiple cross site scripting vulnerabilities.
d7569efb8aa43b82a644349933caa33f4b87c6cc7b66ea35071108fd2c58c6de
ePhoto Transfer version 1.2.1 for iOS suffers from cross site scripting, denial of service, and command injection vulnerabilities.
b760dca188157850efec772c653425fb6915a3d91cdcb48fcb82b2b3a9dce9b4
Barracuda CudaTel version 2.6.02.04 suffers from multiple cross site scripting vulnerabilities.
528d3becd6804f4959774acb5ff4bc799be6924cb3031d9c48849a865d6961b3