exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 376 RSS Feed

Files Date: 2013-07-01 to 2013-07-31

Flash JIT - Spraying Info Leak Gadgets
Posted Jul 19, 2013
Authored by Fermin J. Serna

This document presents a new, and just mitigated, technique to leverage the JIT-ed code to serve as an info leaker and therefore bypass the security mitigation ASLR.

tags | paper
advisories | CVE-2012-4787
SHA-256 | e84ddee51625ea3026e889d9a332f82b1c3b784a10b937271f20b254640e07fb
TinyMCE Image Manager 1.1 XSS / File Upload
Posted Jul 19, 2013
Authored by MustLive

TinyMCE Image Manager versions 1.1 and below suffer cross site scripting and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, file upload
SHA-256 | c4c3c25bb2e20196080641e3f82f29017c3102e1dca37abdab1c4328a6da5895
Flash JIT Internet Explorer 9 Exploit
Posted Jul 19, 2013
Authored by Fermin J. Serna

Flash exploit for Win7/IE9 that bypasses ASLR by spraying ROP info leak gadgets.

tags | exploit
systems | linux
advisories | CVE-2012-4787
SHA-256 | 21ff973f2decc557bafa5724aaef1dde8c1ac3345e644fe4331701d3a4e9e176
Sybase EAServer 6.3.1 Directory Traversal / XXE Injection / Command Execution
Posted Jul 19, 2013
Authored by Gerhard Wagner | Site sec-consult.com

Sybase EAServer versions 6.3.1 and below suffer from directory traversal, XML entity injection, and OS command execution vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 9a7fc5b427a418fe68dc14cad397d8ec6b9a5eb65ce69a35e2127e97aa52bf08
nginx Backdoor
Posted Jul 19, 2013
Authored by t57root | Site hackshell.net

This code is a backdoor for nginx. It provides remote shell access, SOCKS5 tunneling, and HTTP password sniffing and logging.

tags | tool, remote, web, shell, rootkit
systems | unix
SHA-256 | 8f754357b61c73fe20efc8dd28b52d222feb812bbaf36bebdfee47e30d0ddfb1
Debian Security Advisory 2724-1
Posted Jul 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2724-1 - Several vulnerabilities have been discovered in the Chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2013-2853, CVE-2013-2867, CVE-2013-2868, CVE-2013-2869, CVE-2013-2870, CVE-2013-2871, CVE-2013-2873, CVE-2013-2875, CVE-2013-2876, CVE-2013-2877, CVE-2013-2878, CVE-2013-2879, CVE-2013-2880
SHA-256 | c56abdd979ad1791b0c97f5cbfe6e0aea3eb1051cb9ca106027b3fa6fbfd6a9d
Suricata IDPE 1.4.4
Posted Jul 19, 2013
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release improves inspection order in relation to stream reassembly and fixes a false positive on IP fragments, the pass action, HTTP Connect tunnel crashes, and several Unix socket issues.
tags | tool, intrusion detection
systems | unix
SHA-256 | 99024c4c257f667711bc918ee0181bdb40f11548d6dc7e061564a5d5cbeae1f7
Xibo 1.2.2 / 1.4.1 Directory Traversal
Posted Jul 19, 2013
Authored by Mahendra

Xibo versions 1.2.2 and 1.4.1 suffer from a directory traversal vulnerability in index.php.

tags | exploit, php, file inclusion
advisories | OSVDB-92934
SHA-256 | db13329517e01c436a20ea776614b0531a22176dc06910d6e651917d87fd33fc
Windows Movie Maker 2.1.4026.0 Denial Of Service
Posted Jul 19, 2013
Authored by ariarat

Windows Movie Maker version 2.1.4026.0 crash proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | windows
advisories | CVE-2013-4858
SHA-256 | 77267103b3d7d65ebb1e4360830b516ec3bb795821bf678615837b551d5e6b04
Nginx 1.3.9 / 1.4.0 Buffer Overflow
Posted Jul 19, 2013
Authored by Hoang-Vu Dang | Site vnsecurity.net

Nginx versions 1.3.9 and 1.4.0 chunked encoding stack based buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2013-2028
SHA-256 | e568d34f409666b4b38b816f6e12c700985eef965d9935fab1764f2b9c979b77
Apple Quicktime 7 Invalid Atom Length Buffer Overflow
Posted Jul 18, 2013
Authored by Jason Kratzer, sinn3r, Paul Bates, Tom Gallagher | Site metasploit.com

This Metasploit module exploits a vulnerability found in Apple Quicktime. The flaw is triggered when Quicktime fails to properly handle the data length for certain atoms such as 'rdrf' or 'dref' in the Alis record, which may result a buffer overflow by loading a specially crafted .mov file, and allows arbitrary code execution under the context of the user.

tags | exploit, overflow, arbitrary, code execution
systems | apple
advisories | CVE-2013-1017
SHA-256 | 15145b2469bd29030e19b5448ca2e224d6efff120fdd50fb770f210db2a4b736
HP Managed Printing Administration jobAcct Remote Command Execution
Posted Jul 18, 2013
Authored by Andrea Micalizzi, juan vazquez | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability on HP Managed Printing Administration 2.6.3 (and before). The vulnerability exists in the UploadFiles() function from the MPAUploader.Uploader.1 control, loaded and used by the server. The function can be abused via directory traversal and null byte injection in order to achieve arbitrary file upload.

tags | exploit, arbitrary, file upload
advisories | CVE-2011-4166, OSVDB-78015
SHA-256 | 6b9c2fdb66e0b18c5c373af45ca8b8d1347dba271986c98d13999847c6f76701
Debian Security Advisory 2725-1
Posted Jul 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2725-1 - Two security issues have been found in the Tomcat servlet and JSP engine.

tags | advisory
systems | linux, debian
advisories | CVE-2012-3544, CVE-2013-2067
SHA-256 | 76b85ff0d5e73cbb8122a1d6e4d0e53d836304cf9791d27b1dd78a04a28ceef8
Symantec Workspace Virtualization 6.4.1895.0 Privilege Escalation
Posted Jul 18, 2013
Authored by MJ0011

Symantec Workspace Virtualization version 6.4.1895.0 local kernel mode privilege escalation exploit.

tags | exploit, kernel, local
SHA-256 | f34f6ca8bbdca39830d0989067fe1fd85f518a6ff01379b69ea72a1c01e5f5b9
HP Security Bulletin HPSBMU02900
Posted Jul 18, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02900 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Local Denial of Service (DoS), remote Denial of Service (DoS), execution of arbitrary code, gain privileges, disclosure of information, unauthorized access, or XSS. Revision 1 of this advisory.

tags | advisory, remote, denial of service, arbitrary, local, vulnerability
systems | linux, windows
advisories | CVE-2011-3389, CVE-2012-0883, CVE-2012-2110, CVE-2012-2311, CVE-2012-2329, CVE-2012-2335, CVE-2012-2336, CVE-2013-2355, CVE-2013-2356, CVE-2013-2357, CVE-2013-2358, CVE-2013-2359, CVE-2013-2360, CVE-2013-2361, CVE-2013-2362, CVE-2013-2363, CVE-2013-2364, CVE-2013-5217
SHA-256 | 9864656a8c7f02f65287405b436e81a4bfb33db55bb9dbe7aea8240180e998a1
HP Security Bulletin HPSBST02896 2
Posted Jul 18, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBST02896 2 - A potential security vulnerability has been identified with the HP StoreVirtual Storage. This vulnerability could be remotely exploited to gain unauthorized access to the device. All HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer. This functionality cannot be disabled today. HP StoreVirtual products are storage appliances that use a custom operating system, LeftHand OS, which is not accessible to the end user. Limited access is available to the user via the HP StoreVirtual Command-Line Interface (CLiQ) however root access is blocked. Root access may be requested by HP Support in some cases to help customers resolve complex support issues. To facilitate these cases, a challenge-response-based one-time password utility is employed by HP Support to gain root access to systems when the customer has granted permission and network access to the system. The one-time password utility protects the root access by preventing repeated access to the system with the same pass phrase. Root access to the LeftHand OS does not provide access to the user data being stored on the system. Revision 2 of this advisory.

tags | advisory, root
advisories | CVE-2013-2352
SHA-256 | e39626a882fac82518af8405435038f5279f1f206d95e388f032ec3a0a67d197
WordPress WooCommerce 2.0.12 Cross Site Scripting
Posted Jul 18, 2013
Authored by Mirza Burhan Baig | Site blackbitz.net

WordPress WooCommerce version 2.0.12 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 57d7189e7893db13f998b57e482f7f386bd27a5aca10ffb821839d7f9bf89a5f
Drupal Hostmaster 6.x Access Bypass
Posted Jul 18, 2013
Authored by Tim Lovelock | Site drupal.org

Drupal Hostmaster third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 029ae096eab1d32c2fdce40b827087a83a9a993ec8dd7ca249ba58232224eba4
Cisco Security Advisory 20130717-ips
Posted Jul 18, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Intrusion Prevention System (IPS) Software is affected by multiple denial of service vulnerabilities. Customers running a vulnerable version of the Cisco IDSM-2 Module should refer to the "Workarounds" section of this advisory for available mitigations. Workarounds that mitigate the Cisco IPS Software Fragmented Traffic Denial of Service Vulnerability and Cisco IDSM-2 Malformed TCP Packets Denial of Service Vulnerability are available.

tags | advisory, denial of service, tcp, vulnerability
systems | cisco
SHA-256 | 8f827a747809b4b88d7227babf5e52be7838679b0e8ecb6655d3111b7dafa0a1
Roundcube Webmail 0.9.2 Cross Site Scripting
Posted Jul 18, 2013
Authored by Andrea Menin

Roundcube Webmail version 0.9.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-5645
SHA-256 | 63d09fabc0afbeb3b88708f8ea18b1e43d41a4e9021017ca8052bcdb3521dec6
Java SE 7 Issue 69
Posted Jul 18, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has submitted a new vulnerability to Oracle that implements a classic attack against Java VM.

tags | advisory, java
SHA-256 | 06b801519ec428ee719f86858e50021889fbd7008bbcfe62c1df7a749f41a4e1
Dell PacketTrap PSA 7.1 Cross Site Scripting
Posted Jul 18, 2013
Authored by Benjamin Kunz Mejri, Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

Dell PacketTrap PSA version 7.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | bf0b266ef4f6fd353ad738b5f63250382aa534a5a379b1fe6feb16487668febc
Dell PacketTrap MSP RMM 6.6.x Cross Site Scripting
Posted Jul 18, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Dell PacketTrap MSP RMM version 6.6.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d7569efb8aa43b82a644349933caa33f4b87c6cc7b66ea35071108fd2c58c6de
ePhoto Transfer 1.2.1 XSS / DoS / Command Injection
Posted Jul 18, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

ePhoto Transfer version 1.2.1 for iOS suffers from cross site scripting, denial of service, and command injection vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
SHA-256 | b760dca188157850efec772c653425fb6915a3d91cdcb48fcb82b2b3a9dce9b4
Barracuda CudaTel 2.6.02.04 Cross Site Scripting
Posted Jul 18, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Barracuda CudaTel version 2.6.02.04 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 528d3becd6804f4959774acb5ff4bc799be6924cb3031d9c48849a865d6961b3
Page 6 of 15
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close