exploit the possibilities
Showing 1 - 21 of 21 RSS Feed

Files Date: 2013-09-09 to 2013-09-10

ZRTP Protocol Library 2.3.4
Posted Sep 9, 2013
Site gnutelephony.org

ZRTP Protocol Library is an implementation of Phil Zimmermann's ZRTP protocol, created based on and interoperable with Zfone beta 2. Combined with the GNU RTP Stack (ccrtp), this offers the ability to create communication services that natively support the ZRTP protocol.

Changes: Essential fixes for CVE-2013-2222 / CVE-2013-2223. Better support for both OpenSSL and GnuTLS. Paranoid mode support. Improved support for mingw builds. Many additional improvements since the 2.0.0 release.
tags | protocol, library
systems | unix
advisories | CVE-2013-2222, CVE-2013-2223
MD5 | 3aac59472c5649736e24de30080e2efd
glFusion 1.3.0 SQL Injection
Posted Sep 9, 2013
Authored by Omar Kurt | Site netsparker.com

glFusion version 1.3.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 27555ed763a00648fe151d6b721bff28
GNU SIP Witch Telephony Server 1.8.0
Posted Sep 9, 2013
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Support for systemd init. Multi-protocol context aware when built with exosip2 4.x for concurrent TCP/UDP/TLS sip sessions in a single server instance. An SRV plugin to better support automatic resolution of remote users through DNS (requires libruli to use). Improved mingw build support.
tags | telephony
systems | unix
MD5 | 917d867bfb76daaa840ee6cb5e8b1eb3
MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free
Posted Sep 9, 2013
Authored by Peter Vreugdenhil, sinn3r, Orange Tsai | Site metasploit.com

In IE8 standards mode, it's possible to cause a use-after-free condition by first creating an illogical table tree, where a CPhraseElement comes after CTableRow, with the final node being a sub table element. When the CPhraseElement's outer content is reset by using either outerText or outerHTML through an event handler, this triggers a free of its child element (in this case, a CAnchorElement, but some other objects apply too), but a reference is still kept in function SRunPointer::SpanQualifier. This function will then pass on the invalid reference to the next functions, eventually used in mshtml!CElement::Doc when it's trying to make a call to the object's SecurityContext virtual function at offset +0x70, which results a crash. An attacker can take advantage of this by first creating an CAnchorElement object, let it free, and then replace the freed memory with another fake object. Successfully doing so may allow arbitrary code execution under the context of the user. This bug is specific to Internet Explorer 8 only. It was originally discovered by Orange Tsai at Hitcon 2013, but was silently patched in the July 2013 update.

tags | exploit, arbitrary, code execution
MD5 | 74b6b32915819574e8ce5b7d01bc1f60
HP SiteScope Remote Code Execution
Posted Sep 9, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a code execution flaw in HP SiteScope. The vulnerability exists on the opcactivate.vbs script, which is reachable from the APIBSMIntegrationImpl AXIS service, and uses WScript.Shell.run() to execute cmd.exe with user provided data. Note which the opcactivate.vbs component is installed with the (optional) HP Operations Agent component. The module has been tested successfully on HP SiteScope 11.20 (with HP Operations Agent) over Windows 2003 SP2.

tags | exploit, shell, code execution
systems | windows
advisories | CVE-2013-2367, OSVDB-95824
MD5 | 54e615e8ccdc8c83cefabd5dc954b93a
Android FTP Server 1.2 Privilege Escalation
Posted Sep 9, 2013
Authored by Larry W. Cashdollar

Android FTP Serve version 1.2 exposes the configuration file with full read and write permissions. A malicious party can overwrite the credentials for the administrator and escalate privileges.

tags | exploit
MD5 | c59f87bb2a7d3a30d4077bbd4f8c474c
lshell 0.9.16
Posted Sep 9, 2013
Authored by Ignace Mouzannar | Site lshell.ghantoos.org

lshell lets you restrict a user's shell environment to limited sets of commands, choose to enable or disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user's commands, implement timing restrictions, and more.

Changes: Lots of new code and code cleanup has been done in this version. Many bugs have been fixed.
tags | tool, shell
systems | unix
MD5 | 6630e2e2200fbe5d1376dcad26daf6be
Moodle 2.3.9 / 2.4.9 Javascript Insertion
Posted Sep 9, 2013
Authored by Ciaran McNally

Moodle versions 2.3.9 and below and 2.4.6 suffer from a javascript insertion vulnerability that allows for the addition of an RSS blog.

tags | exploit, javascript
MD5 | 283f28e20043f8734598d1baeb57972f
Ruby Gem Features 0.3.0 Injection
Posted Sep 9, 2013
Authored by Larry W. Cashdollar

Ruby Gem Features version 0.3.0 suffers from a file injection vulnerability that can lead to cross site scripting.

tags | exploit, xss, ruby
MD5 | cda6fa9ea76cdb6b437f75ce82bada8e
Watchguard Server Center 11.7.4 Insecure Library Loading
Posted Sep 9, 2013
Authored by Julien Ahrens | Site rcesecurity.com

Watchguard Server Center version 11.7.4 suffers from a dll hijacking vulnerability with wgpr.dll.

tags | exploit
systems | windows
advisories | CVE-2013-5701
MD5 | f5986ec93517a7355f10d23daef9ae4d
Ubuntu Security Notice USN-1948-1
Posted Sep 9, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1948-1 - It was discovered that httplib2 only validated SSL certificates on the first request to a connection, and didn't report validation failures on subsequent requests. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could possibly be exploited in certain scenarios to alter or compromise confidential information in applications that used the httplib2 library.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2013-2037
MD5 | 355d85652efffcbbfeb8b5f74fc728e6
Mandriva Linux Security Advisory 2013-227
Posted Sep 9, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-227 - A vulnerability has been discovered and corrected in easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product. The updated python-setuptools packages has been upgraded to the 0.9.8 version and the python-virtualenv packages has been upgraded to the 1.10.1 version which is not vulnerable to this issue.

tags | advisory, web, arbitrary, python
systems | linux, mandriva
advisories | CVE-2013-1633
MD5 | 520c1d270c4f885b8eb147d9079fb02a
Red Hat Security Advisory 2013-1218-01
Posted Sep 9, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1218-01 - Apache Santuario implements the XML Signature Syntax and Processing and XML Encryption Syntax and Processing standards. A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block.

tags | advisory, java, remote, arbitrary, spoof
systems | linux, redhat
advisories | CVE-2013-2172
MD5 | a6c50c5adb2cae53d0411656c1cf4f50
Red Hat Security Advisory 2013-1219-01
Posted Sep 9, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1219-01 - Apache Santuario implements the XML Signature Syntax and Processing and XML Encryption Syntax and Processing standards. A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block.

tags | advisory, java, remote, arbitrary, spoof
systems | linux, redhat
advisories | CVE-2013-2172
MD5 | 7583fd22d0426f64ceccc8c238a80aa8
Red Hat Security Advisory 2013-1217-01
Posted Sep 9, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1217-01 - Apache Santuario implements the XML Signature Syntax and Processing and XML Encryption Syntax and Processing standards. A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block.

tags | advisory, java, remote, arbitrary, spoof
systems | linux, redhat
advisories | CVE-2013-2172
MD5 | ea1e8597d73b473ee0b4b08a0cc38128
Red Hat Security Advisory 2013-1221-01
Posted Sep 9, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1221-01 - Fuse Message Broker is a messaging platform based on Apache ActiveMQ that provides SOA infrastructure to connect processes across heterogeneous systems. It was found that, by default, the Apache ActiveMQ web console did not require authentication. A remote attacker could use this flaw to modify the state of the Apache ActiveMQ environment, obtain sensitive information, or cause a denial of service. This update delivers a README file which describes how to manually configure an XML properties file to fix this flaw. Back up existing Fuse Message Broker configuration files before making changes.

tags | advisory, remote, web, denial of service
systems | linux, redhat
advisories | CVE-2013-3060
MD5 | 11491056fc22d041e1989423495f0b59
Red Hat Security Advisory 2013-1220-01
Posted Sep 9, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1220-01 - Apache Santuario implements the XML Signature Syntax and Processing and XML Encryption Syntax and Processing standards. A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block.

tags | advisory, java, remote, arbitrary, spoof
systems | linux, redhat
advisories | CVE-2013-2172
MD5 | 0449ea62492f6c1ca616dc82972f24fc
E-Local Business Directory SQL Injection
Posted Sep 9, 2013
Authored by Lazmania61

E-Local Business Directory suffers from a remote SQL injection vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, local, sql injection
MD5 | 3498e3b20e70a5f45df7dcc2853e52f6
Real Estate PHP Script Cross Site Scripting
Posted Sep 9, 2013
Authored by Lazmania61

Real Estate PHP Script suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
MD5 | 2153c3f5f6b0ab02b42fdb6c2c806972
freeFTPd 1.0.10 PASS Command SEH Overflow
Posted Sep 9, 2013
Authored by Wireghoul, Muhamad Fadzil Ramli | Site metasploit.com

This Metasploit module exploits a SEH stack-based buffer overflow in freeFTPd Server PASS command version 1.0.10.

tags | exploit, overflow
advisories | OSVDB-96517
MD5 | 641f7e9e152f85ce86c721d7fff6c050
Xoops 2.5.6 Cross Site Scripting
Posted Sep 9, 2013
Authored by Mehdi Dadkhah

Xoops version 2.5.6 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 03303ff53305c334488745b5b27c8388
Page 1 of 1
Back1Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close