exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 400 RSS Feed

Files Date: 2013-10-01 to 2013-10-31

Open Flash Chart 2 Arbitrary File Upload
Posted Oct 26, 2013
Authored by Braeden Thomas | Site metasploit.com

This Metasploit module exploits a file upload vulnerability found in Open Flash Chart version 2. Attackers can abuse the 'ofc_upload_image.php' file in order to upload and execute malicious PHP files.

tags | exploit, php, file upload
advisories | CVE-2009-4140, OSVDB-59051
SHA-256 | b8a492ec3d568f27f3072ee7a134a2a0e51461ff46fb4b93914e0b100f645e82
Gentoo Linux Security Advisory 201310-15
Posted Oct 25, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-15 - Multiple vulnerabilities have been found in GNU Automake, allowing local arbitrary command execution with the privileges of the user running an Automake-based build. Versions less than 1.11.6 are affected.

tags | advisory, arbitrary, local, vulnerability
systems | linux, gentoo
advisories | CVE-2009-4029, CVE-2012-3386
SHA-256 | c4712ff82db88c59238cb2745a8aefc2c8dff9ef3b49bb02939e39dc4769bc18
Symantec Workspace Streaming 7.5.0.493 Rmote Code Execution
Posted Oct 25, 2013
Authored by rgod | Site retrogod.altervista.org

Symantec Workspace Streaming version 7.5.0.493 suffers from a SWS streamlet engine invoker servlets remote code execution vulnerability. Proof of concept code included.

tags | exploit, remote, code execution, proof of concept
SHA-256 | 013fe724276f3efdcdb2e04f6e5462344632c6aeb84259e399b9fb314b8d088d
Onpub CMS 1.4 / 1.5 SQL Injection
Posted Oct 25, 2013
Authored by Benjamin Kunz Mejri, Marcel Bernhardt, Vulnerability Laboratory | Site vulnerability-lab.com

Onpub CMS versions 1.4 and 1.5 suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 29be76c26f70a0a77e21ebbba24a61a7fc1665dd3abf256dbbaa9777f05ae7cf
Gentoo Linux Security Advisory 201310-13
Posted Oct 25, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-13 - Multiple vulnerabilities have been found in MPlayer and the bundled FFmpeg, the worst of which may lead to the execution of arbitrary code. Versions less than 1.1-r1 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2007-6718, CVE-2008-4610, CVE-2010-2062, CVE-2010-3429, CVE-2011-3625
SHA-256 | 08965766fcae25256090b4e385c2d0b3cb8116f70820f4e55055009d3309d422
Gentoo Linux Security Advisory 201310-12
Posted Oct 25, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-12 - Multiple vulnerabilities were found in FFmpeg, the worst of which might enable remote attackers to cause user-assisted execution of arbitrary code. Versions less than 1.0.7 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-4631, CVE-2009-4632, CVE-2009-4633, CVE-2009-4634, CVE-2009-4635, CVE-2009-4636, CVE-2009-4637, CVE-2009-4638, CVE-2009-4639, CVE-2009-4640, CVE-2010-3429, CVE-2010-3908, CVE-2010-4704, CVE-2010-4704, CVE-2010-4705, CVE-2011-1931, CVE-2011-3362, CVE-2011-3893, CVE-2011-3895, CVE-2011-3929, CVE-2011-3934, CVE-2011-3935, CVE-2011-3936, CVE-2011-3937, CVE-2011-3940, CVE-2011-3941, CVE-2011-3944, CVE-2011-3945
SHA-256 | d23e903782e194c3e161da651dead966b61dd687650a2ec514384ffd8de17b78
Lynis Auditing Tool 1.3.3
Posted Oct 25, 2013
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: This release has improved support for NTP time syncing (client or daemon) and improved tests for empty shells on FreeBSD. Logging has been extended and small corrections have been made.
tags | tool, scanner
systems | unix
SHA-256 | 7389dff4435dbb31612ceb1a4260cfd7383ed58182a216b128d8e1cfd34118f7
Gentoo Linux Security Advisory 201310-14
Posted Oct 25, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-14 - Multiple vulnerabilities have been found in Groff, allowing context-dependent attackers to conduct symlink attacks. Versions less than 1.22.2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2009-5044, CVE-2009-5078, CVE-2009-5079, CVE-2009-5080, CVE-2009-5081, CVE-2009-5082
SHA-256 | 4c8b8107de41173ce0db5640699699fd0f4ae5cfcb10a6a2cf1b52bf8d21c739
CA SiteMinder Cross Site Scripting
Posted Oct 25, 2013
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to a potential vulnerability in CA SiteMinder that can be mitigated by utilizing existing product functionality. The vulnerability can potentially allow a remote attacker to conduct a cross-site scripting attack and execute script in the security context of the SiteMinder domain. Customers should review their SiteMinder deployments to verify that the vulnerability mitigating functionality is enabled. Versions 12.51, 12.5, 12.0 and 6 Web Agents are affected.

tags | advisory, remote, web, xss
advisories | CVE-2013-5968
SHA-256 | 7484ac45d17585798083790d7030a16af3adf9a7edd7018fd77567ee3e3aaf5c
WebCollab 3.30 HTTP Response Splitting
Posted Oct 25, 2013
Authored by Manuel Garcia Cardenas | Site isecauditors.com

WebCollab versions 3.30 and below suffer from an HTTP response splitting vulnerability.

tags | exploit, web
advisories | CVE-2013-2652
SHA-256 | a895d7c4a4695a9aeb270f6abf9d85d121c81cc0b634d6443284f1cfba111448
Feeder.co RSS Feeder 5.2 Cross Site Scripting
Posted Oct 25, 2013
Authored by Ateeq ur Rehman Khan, Vulnerability Laboratory | Site vulnerability-lab.com

Feeder.co RSS Feeder version 5.2 for Chrome suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c227d9d9a4c7675cd2e18a765b40cd5955a316d3ece0b557dcc289f4c9d80f82
Webwiz Rich Text Editor Finder For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

This is a Webwiz Rich Text Editor file upload page discovery module for Recon-NG.

tags | tool, scanner, file upload
systems | unix
SHA-256 | 865eb4c812edca67575bd0f50b8854c158f04d5a59f498bb0dcc994a35bcecf6
GenericRestaurantMenu For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

GenericRestaurantMenu is a discovery module for Recon-NG that looks for Menu Categories Editor page vulnerabilities including SQL injection.

tags | tool, scanner, vulnerability, sql injection
systems | unix
SHA-256 | f943a5ee2c3e7871721b443d21b01ae5f16ce393bf8c4fcfe241ffc0046144ff
Uploadify 3.2.1 Shell Upload / Information Disclosure
Posted Oct 25, 2013
Authored by MustLive

Uploadify versions 3.2.1 and below suffer from remote shell upload and information disclosure vulnerabilities.

tags | exploit, remote, shell, vulnerability, info disclosure
SHA-256 | 42181d90d3a59f79ebd60cc206e7db18525b5ce197976ea8e3cd7560476156fb
Dot Net Nuke File Upload Checker For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

This is a vulnerability checking script for Recon-NG that looks for hosts with a Dot Net Nuke fcklinkgallery page that allows for a remote shell upload.

tags | tool, remote, shell, scanner
systems | unix
SHA-256 | ed7c15cc25a3447557533bfd64be83d545b106112fe7ad39f81e52e6935755c3
JReport Cross Site Request Forgery
Posted Oct 25, 2013
Authored by asheesh anaconda, Asheesh Kumar Mani Tripathi

JReport suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f1edcf7336d77073aafbe4e97e41a339bab3dfa611e51b9971a3df90fe3b8995
WordPress GeoPlaces 4.x Shell Upload
Posted Oct 25, 2013
Authored by DevilScreaM

WordPress GeoPlaces theme version 4.x suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 4bb5ca362685571ea46f9b60300a56f3aa737abbf2c8551c66c53798de33803e
easyXDM 2.4.16 Cross Site Scripting
Posted Oct 24, 2013
Authored by Krzysztof Kotowicz

easyXDM library versions 2.4.16 and below suffer from cross site scripting and parameter injection vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-5212
SHA-256 | 19287ecdc95f0de8cf7a407c73fe7767c29a4796809ff7e42f9f42c9b254d703
NetCrypt .NET Executable Packer
Posted Oct 24, 2013
Authored by Yvan Janssens | Site github.com

This tool is a proof-of-concept packer for .NET executables designed to provide a starting point to explain the basic principles of runtime packing.

tags | tool
SHA-256 | 00edbbabaeeafd89302340cee6a316b6a2882f9c7f305be53f952d2c234eaf60
Contexis CMS 1.0 Cross Site Scripting
Posted Oct 24, 2013
Authored by Juan Francisco

Contexis CMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-6239
SHA-256 | ab5e2108f93cfcf2603751d8a48b52da0ef3be80421319c493809fa7004539fb
Debian Security Advisory 2783-2
Posted Oct 24, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2783-2 - The update of librack-ruby in DSA-2783-1 also addressed CVE-2013-0183. The patch applied breaks rails applications like redmine (see Debian Bug #727187). Updated packages are available to address this problem.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2011-5036, CVE-2013-0183, CVE-2013-0184, CVE-2013-0263
SHA-256 | 7166a2e1c6865221cfe34af826a8c7a766cf04432e78842feb087c02e0f3fe25
Ubuntu Security Notice USN-2007-1
Posted Oct 24, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2007-1 - Martin Carpenter discovered that Apport set incorrect permissions on core dump files generated by setuid binaries. A local attacker could possibly use this issue to obtain privileged information.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2013-1067
SHA-256 | b01329a47b0a84943e0929f31ba03f709200ed7f5762f7a5ad9544c85128d498
Ubuntu Security Notice USN-2008-1
Posted Oct 24, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2008-1 - Ralph Loader discovered that Suds incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files. In the default installation of Ubuntu, this should be prevented by the Yama link restrictions.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2013-2217
SHA-256 | bf71a760565d6513e96914418c72277da4c645c885cd2d33c760bcdbfcb9f300
Ubuntu Security Notice USN-2006-1
Posted Oct 24, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2006-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.72 in Ubuntu 10.04 LTS. Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 and Ubuntu 13.10 have been updated to MySQL 5.5.34. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2013-3839, CVE-2013-5807
SHA-256 | cb8de417ff7f62570e9cf059820b5b3e849c9637f24c9974857bfb156a0ab65f
Red Hat Security Advisory 2013-1459-01
Posted Oct 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1459-01 - The GNU Privacy Guard is a tool for encrypting data and creating digital signatures, compliant with the proposed OpenPGP Internet standard and the S/MIME standard. A denial of service flaw was found in the way GnuPG parsed certain compressed OpenPGP packets. An attacker could use this flaw to send specially crafted input data to GnuPG, making GnuPG enter an infinite loop when parsing data. It was found that importing a corrupted public key into a GnuPG keyring database corrupted that keyring. An attacker could use this flaw to trick a local user into importing a specially crafted public key into their keyring database, causing the keyring to be corrupted and preventing its further use.

tags | advisory, denial of service, local
systems | linux, redhat
advisories | CVE-2012-6085, CVE-2013-4351, CVE-2013-4402
SHA-256 | 66f4f380227d5284e4fe726da477005d273d6e0b0babb21afcad548a7d3c4cc5
Page 4 of 16
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close