exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2013-08-21 to 2013-08-22

Bitbot C2 Panel Cross Site Scripting / SQL Injection
Posted Aug 21, 2013
Authored by bwall

Bitbot C2 Panel suffers from cross site scripting and remote SQL injection vulnerabilities in gate2.php.

tags | exploit, remote, php, vulnerability, xss, sql injection
SHA-256 | 9acd6e911b5c392e36f1f1742b3974de1315faa9855834c5051c0afe4c08ea43
Gentoo Linux Security Advisory 201308-01
Posted Aug 21, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201308-1 - Multiple vulnerabilities have been found in Putty, allowing attackers to compromise user system. Versions less than 0.63 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2011-4607, CVE-2013-4852
SHA-256 | 66310ff1fc5445e6b11309bdaf0d24fd6bab3446706a518e6854f32b73bdecdc
Debian Security Advisory 2739-1
Posted Aug 21, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2739-1 - Two security issues (SQL injection and command line injection via SNMP settings) were found in Cacti, a web interface for graphing of monitoring systems.

tags | advisory, web, sql injection
systems | linux, debian
advisories | CVE-2013-1434, CVE-2013-1435
SHA-256 | 4f76b681152227ee548d6e842eaa9300d16504ad370b4b15992496ea92e4272c
Red Hat Security Advisory 2013-1171-01
Posted Aug 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1171-01 - HTCondor is a specialized workload management system for compute-intensive jobs. It provides a job queuing mechanism, scheduling policy, priority scheme, and resource monitoring and management. A denial of service flaw was found in the way HTCondor's policy definition evaluator processed certain policy definitions. If an administrator used an attribute defined on a job in a CONTINUE, KILL, PREEMPT, or SUSPEND condor_startd policy, a remote HTCondor service user could use this flaw to cause condor_startd to exit by submitting a job that caused such a policy definition to be evaluated to either the ERROR or UNDEFINED states.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2013-4255
SHA-256 | 59bc8939e06de2e9d8397da6e6ee3236b2917b4a5fa9a54f240a7bd5db96a4a7
Red Hat Security Advisory 2013-1172-01
Posted Aug 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1172-01 - HTCondor is a specialized workload management system for compute-intensive jobs. It provides a job queuing mechanism, scheduling policy, priority scheme, and resource monitoring and management. A denial of service flaw was found in the way HTCondor's policy definition evaluator processed certain policy definitions. If an administrator used an attribute defined on a job in a CONTINUE, KILL, PREEMPT, or SUSPEND condor_startd policy, a remote HTCondor service user could use this flaw to cause condor_startd to exit by submitting a job that caused such a policy definition to be evaluated to either the ERROR or UNDEFINED states.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2013-4255
SHA-256 | 0033d50c3ed1940df4b1a9b7577cc883eb9c2a3e9216baf092455746e541ef5b
Red Hat Security Advisory 2013-1170-01
Posted Aug 21, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1170-01 - MongoDB is a NoSQL database. PyMongo provides tools for working with MongoDB. A flaw was found in the run() function implementation in MongoDB. A database user permitted to send database queries to a MongoDB server could use this flaw to crash the server or, possibly, execute arbitrary code with the privileges of the mongodb user. A NULL pointer dereference flaw was found in PyMongo. An invalid DBRef record received from a MongoDB server could cause an application using PyMongo to crash.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2013-1892, CVE-2013-2132
SHA-256 | 774c26c772c453155510a81f629828067abba89f9124529d494aa46bbc077c37
Mandriva Linux Security Advisory 2013-214
Posted Aug 21, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-214 - Ryan Sleevi of the Google Chrome Security Team has discovered that Python's SSL module doesn't handle NULL bytes inside subjectAltNames general names. This could lead to a breach when an application uses ssl.match_hostname() to match the hostname against the certificate's subjectAltName's dNSName general names.

tags | advisory, python
systems | linux, mandriva
advisories | CVE-2013-4328
SHA-256 | bef1309c97ca6142e08e1d6ed64b7117003913520e969b3da85863a63dcb4168
Samba Remote Denial Of Service
Posted Aug 21, 2013
Authored by x90c

Samba malformed nttrans smb packet remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2013-4124
SHA-256 | 7c05718e61505b529b4fc56fdb9fe34f5f090de5045c62a525a74a2d1108d2f6
Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment
Posted Aug 21, 2013
Authored by Ramon de C Valle | Site metasploit.com

This Metasploit module exploits a mass assignment vulnerability in the create action of users controller of Foreman and Red Hat OpenStack/Satellite (Foreman 1.2.0-RC1 and earlier) by creating an arbitrary administrator account. For this exploit to work, your account must have create_users permission (e.g., Manager role).

tags | exploit, arbitrary
systems | linux, redhat
advisories | CVE-2013-2113, OSVDB-94655
SHA-256 | 8aba4389b4b51efa17c66a8c2ddaabb0489ae3e020c3f31852637c4d80e383a3
Samba nttrans Replay Integer Overflow
Posted Aug 21, 2013
Authored by x90c

This is a brief paper detailing the Samba nttrans reply integer overflow vulnerability.

tags | paper, overflow
advisories | CVE-2013-4124
SHA-256 | d225d3176b11780faefe076ec78e17e446d910e7a58fe9d59851b2b612d3da4e
DeWeS 0.4.2 Path Traversal
Posted Aug 21, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

DeWeS web server version 0.4.2 suffers from a path traversal vulnerability.

tags | exploit, web, file inclusion
advisories | CVE-2013-4900
SHA-256 | 4afc73f6c6a59ae86bda8007462935bdef406857a24bfcf735e6a96cd7d35629
Sparty 0.1
Posted Aug 21, 2013
Site sparty.secniche.org

Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize the security configurations of sharepoint and frontpage based web applications. Due to the complex nature of these web administration software, it is required to have a simple and efficient tool that gathers information, check access permissions, dump critical information from default files and perform automated exploitation if security risks are identified. A number of automated scanners fall short of this and Sparty is a solution to that.

tags | tool, web, scanner, python
systems | unix
SHA-256 | f7b4720b68387a85282ee51ecffe1c6bd87d4c236fb4fcacbe37fb52ae430b18
WordPress ThinkIT 0.1 CSRF / Cross Site Scripting
Posted Aug 21, 2013
Authored by Yashar shahinzadeh

WordPress ThinkIT plugin version 0.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | c90446a2eb9017cdbc5731fbf2064761282210ad9dd1d715bbee4864fc0cf357
AlgoSec Firewall Analyzer 6.4 Cross Site Scripting
Posted Aug 21, 2013
Authored by asheesh anaconda, Asheesh Kumar Mani Tripathi

AlgoSec Firewall Analyzer version 6.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9bcc2f40ac9e807f1a16248fc4024bf27aad4a0478dac50095192c75003afc86
freeFTPd 1.0.10 Buffer Overflow
Posted Aug 21, 2013
Authored by Wireghoul | Site justanotherhacker.com

freeFTPd version 1.0.10 PASS command SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 9074bf6f86b7de3c41e626bf72906b7cbd156074f91c6eb66bcbbe469169d303
ALLMediaServer 0.95 Overflow For Win 7
Posted Aug 21, 2013
Authored by metacom

ALLMediaServer version 0.95 SEH overflow exploit written for Windows 7 German.

tags | exploit, overflow
systems | windows
SHA-256 | f54af71371112fc674b417f9ec24af93d58fb527474b125641029fc8ffe667fd
Graphite Web Unsafe Pickle Handling
Posted Aug 21, 2013
Authored by Charlie Eriksen | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in the pickle handling of the rendering code in the Graphite Web project between version 0.9.5 and 0.9.10 (both included).

tags | exploit, remote, web, code execution
advisories | CVE-2013-5093
SHA-256 | 0f555feb3d15fc98268fab4b33a7b53a4faf6aafadda34aaaa8c5586821e65a8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close