exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2014-06-02 to 2014-06-03

s3dvt Privilege Escalation
Posted Jun 2, 2014
Authored by Hector Marco, Ismael Ripoll

s3dvt suffers from a local privilege escalation vulnerability due to a lack of checking the setuid() return code.

tags | advisory, local
advisories | CVE-2013-6876
SHA-256 | 0a8c3b679a43618d9ffc8263cd5c4998800f72c4afbd6b76ebceaaf9c16532cb
Red Hat Security Advisory 2014-0590-01
Posted Jun 2, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0590-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2014-0107
SHA-256 | 3ce09e0bbeeb6807c5f3a1b061e52b4fed2040dff175631e1dea9699fa8069a1
Red Hat Security Advisory 2014-0591-01
Posted Jun 2, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0591-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2014-0107
SHA-256 | 6e5aa47c9793de7bbc749ed60941233204e1aac6ba6a029a0ab7beec583f54f9
Ubuntu Security Notice USN-2229-1
Posted Jun 2, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2229-1 - Joonas Kuorilehto discovered that GnuTLS incorrectly handled Server Hello messages. A malicious remote server or a man in the middle could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-3466
SHA-256 | 909640c0fc291193e5e61d9571f927ddf4e65f724d30fece71cc30df2475a8bf
DCMTK Privilege Escalation
Posted Jun 2, 2014
Authored by Hector Marco

DCMTK versions prior to 3.6.1 suffer from a privilege escalation vulnerability.

tags | advisory
advisories | CVE-2013-6825
SHA-256 | e5daa4eb447688d47ee6554039d298426fdee9e6b9db86fd1833f9b82940238d
Xilisoft Video Converter Ultimate 7.8.1 build-20140505 DLL Hijacking
Posted Jun 2, 2014
Authored by Osanda Malith

Xilisoft Video Converter Ultimate version 7.8.1 build-20140505 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2014-3860
SHA-256 | 9d010a0acfc983062ab447cbeaac928f56e1cce6c41aa73f7ae7b998328e425f
Cetil Cross Site Scripting
Posted Jun 2, 2014
Authored by Felipe Andrian Peixoto

Software made by Cetil but now distributed for free by the Brazilian government suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 43b8dc21aeb405e4b5208b0ce417048266d66db58b7bb5799ac9cdca9d81eaf1
Digital Whisper Electronic Magazine #51
Posted Jun 2, 2014
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 51. Written in Hebrew.

tags | magazine
SHA-256 | 7d939903db20073d0eec06b6e28880dde07185d00ea9408a5b141ec6d6904da4
Ubuntu 12.04 3.x x86_64 perf_swevent_init Local Root
Posted Jun 2, 2014
Authored by Vitaly Nikolenko

Ubuntu 12.04 3.x x86_64 perf_swevent_init local kernel root exploit. Based on semtex.c.

tags | exploit, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2013-2094
SHA-256 | fd9f72a2dd8542f0cfadb2584eac4af048d1bf2fa6f239359482f9522ecc290d
Easy File Management Web Server 5.3 Buffer Overflow
Posted Jun 2, 2014
Authored by Julien Ahrens | Site rcesecurity.com

Easy File Management Web Server version 5.3 USERID remote buffer overflow exploit.

tags | exploit, remote, web, overflow
SHA-256 | b364c7edc6c03e244a4a4f0e0f4d9b842e07eab722f99c60858b54553b348888
WordPress Participants Database 1.5.4.8 SQL Injection
Posted Jun 2, 2014
Authored by Yarubo Research Team

WordPress Participants Database plugin versions 1.5.4.8 and below suffer from an arbitrary remote SQL injection vulnerability.

tags | exploit, remote, arbitrary, sql injection
SHA-256 | bfc21df6b694bca18e519ca1846159aca72eb7d6798097b206b51fa8ad5cd048
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close