exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 390 RSS Feed

Files Date: 2014-07-01 to 2014-07-31

WiFi HD 7.3.0 LFI / Traversal / Command Injection / CSRF
Posted Jul 29, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

WiFi HD version 7.3.0 suffers from local file inclusion, directory traversal, command injection, and cross site request forgery vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, csrf
SHA-256 | 385a35c17ef6e5d6fe31cad54fc9c513afe14f1ef33ed25c6b35b80ff42a5f85
DEScrypt Ztex Bruteforcer
Posted Jul 29, 2014
Authored by GiftsUngiven

Proof of concept project that demonstrates how old FPGA boards can be reused for hash cracking purposes.

tags | tool, cracker, proof of concept
SHA-256 | a5d7dd772b6f73f7bfd7ffca2d5849a002cf66e9c9f01f669a988bda7fac8011
Siemens SIMATIC WinCC Privilege Escalation
Posted Jul 29, 2014
Authored by Siemens ProductCERT | Site siemens.com

Siemens SIMATIC WinCC versions prior to 7.3 suffer from unauthenticated access, privilege escalation, and hard-coded encryption key vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2014-4682, CVE-2014-4683, CVE-2014-4684, CVE-2014-4685, CVE-2014-4686
SHA-256 | 7b2386094198c589bb175e6f6352b3527830abc474c16d1dbe09639309362020
Lyris ListManagerWeb 8.95a Cross Site Scripting
Posted Jul 29, 2014
Authored by 1N3

Lyris ListManagerWeb version 8.95a suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e824ac215ca489b54cbb8e68ab45e456ebda1efbabb8167f8f80f7e30fe06d18
Red Hat Security Advisory 2014-0981-01
Posted Jul 29, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0981-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the ping_init_sock() function of the Linux kernel handled the group_info reference counter. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance futexes. A local, unprivileged user could use this flaw to crash the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2012-6647, CVE-2013-7339, CVE-2014-2672, CVE-2014-2678, CVE-2014-2706, CVE-2014-2851, CVE-2014-3144, CVE-2014-3145
SHA-256 | de80732b0357d6b9f6be6f8c9e7da59e5a32c6ff3a767b3625c79cfd20dbec82
Red Hat Security Advisory 2014-0979-01
Posted Jul 29, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0979-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. It was found that NSS accepted weak Diffie-Hellman Key exchange parameters. This could possibly lead to weak encryption being used in communication between the client and the server.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2014-1491
SHA-256 | 7e472af39243b2111c21f2041f546e46ac85697a4ad1633bc4b0836a92c7ee63
Red Hat Security Advisory 2014-0982-01
Posted Jul 29, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0982-01 - This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite Server 5.4, 5.5, and 5.6. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Several flaws were fixed in the IBM Java 2 Runtime Environment.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5907, CVE-2013-5910, CVE-2013-6629, CVE-2013-6954, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428, CVE-2014-0429
SHA-256 | b4ddf444c5203044fecdf2fbe1d797919572413a3765151f718ef34faded1004
LinkedIn User Account Handling
Posted Jul 29, 2014
Authored by Kishor Sonawane

LinkedIn suffered from a user account handling vulnerability.

tags | exploit, csrf
SHA-256 | dd6ed709186c8feeaebc535e20b97700385afcfc7f3bff6f93e8a57396aa2011
SQLMap ile CSRF Bypass
Posted Jul 29, 2014
Authored by Ibrahim Balic

This whitepaper discusses hacking with sqlmap and leveraging cross site request forgery vulnerabilities. Written in Turkish.

tags | paper, vulnerability, csrf
SHA-256 | 7130a96bfe8e601c63c6db831c76a47578959bc3aa160183ca7c39ba4c380efd
WordPress WhyDoWork AdSense 1.2 XSS / CSRF
Posted Jul 29, 2014
Authored by Dylan Irzi

WordPress WhyDoWork AdSense plugin version 1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | af9bca3fe65b0a9bbf0292a7c524d2bc3961c3d5ba4dc081c13b25eb55493d3d
J&W Communications SQL Injection
Posted Jul 29, 2014
Authored by Hekt0r

Sites created by J&W Communications appear to suffer from remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 65f4085262255284edb648a36920c83ccae9bf601ad67291db7f5c7ac9a711b3
Oxwall 1.7.0 Remote Code Execution
Posted Jul 28, 2014
Authored by LiquidWorm | Site zeroscience.mk

Oxwall suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin/settings/user' script thru the 'avatar' and 'bigAvatar' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php5' extension (to bypass the '.htaccess' block rule) that will be stored in '/ow_userfiles/plugins/base/avatars/' directory. Version 1.7.0 (builds 7907 and 7906) are affected.

tags | exploit, arbitrary, php, code execution
SHA-256 | 8c841d9fd35b8ea44852d334bfc0cbfb91d113810cf27954d9f28bd0fe47a749
Oxwall 1.7.0 Cross Site Request Forgery / Cross Site Scripting
Posted Jul 28, 2014
Authored by LiquidWorm | Site zeroscience.mk

Oxwall version 1.7.0 (builds 7907 and 7906) suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 34546a5be05a8197c0ae4879533d170e5c4a9b004a6b0c51de251d8dcc6cfb19
HP Security Bulletin HPSBGN02936
Posted Jul 28, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN02936 - A potential security vulnerability has been identified with HP and H3C VPN Firewall Module Products. The vulnerability could be remotely exploited resulting in a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2013-4840
SHA-256 | edff2d81ce7184365529aef787166593faca72b38d334fdef41d69d33eb4d493
SQLmap Cheatsheet 1.0
Posted Jul 28, 2014
Authored by Alejandro Ramos

This is a very thorough cheatsheet for using SQLmap.

tags | paper
SHA-256 | ddc97c7300247d96dea29d50c29d669f4ea5e85011b11619ce9658f9642b3ae4
Redis Portscan Utility
Posted Jul 28, 2014
Authored by Alejandro Ramos

This python script port scans a host using a redis server.

tags | tool, scanner, python
systems | unix
SHA-256 | e34e7469c343ec4c195957f541a7b939f348e4592e0efa5781b15ab3d1c6083e
Parallels Tools 9.0 Privilege Escalation
Posted Jul 28, 2014
Authored by Anastasios Monachos

Parallels Tools version 9.0 for Windows suffers from an unquoted search path local privilege escalation vulnerability.

tags | advisory, local
systems | windows
SHA-256 | 4ac561e0a8ae43976d960ffd7ca304c4850b8d9c8ae4062502ad7e6f64ca3b20
iTunes Manifest.mbdb Parser
Posted Jul 28, 2014
Authored by Alejandro Ramos

This python script parses the Manifest.mbdb binary database file from iTunes Backup and prints CSV output.

tags | tool, python
systems | unix
SHA-256 | 00948cd9ec05d0f8cce9a5a8d032ae719d7500423c9432e6280010936d75eaa2
Ground Zero Summit (G0S) 2014 Call For Papers
Posted Jul 28, 2014
Site g0s.org

The Ground Zero Summit (G0S) 2014 Call For Papers has been announced. It will take place November 13th through the 16th, 2014 in New Delhi.

tags | paper, conference
SHA-256 | c02e17c904e25b586337adeb4e003360b4ff3222641904017d48172a23e777c6
Web Encryption Extension Authentication Bypass
Posted Jul 28, 2014
Authored by Ralf Senderek

Web Encryption Extension (WEE) suffers from an authentication bypass vulnerability.

tags | advisory, web, bypass
SHA-256 | d5595fa91a8fa0538252e28f43e88473d0efbfa67e816fb5451770506195f0b3
ZeroCMS 1.0 Cross Site Scripting
Posted Jul 28, 2014
Authored by Mayuresh Dani

ZeroCMS version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-4710
SHA-256 | 909ebd6b36ef74dee3a5d9bdee2d1d0b598e85a27c2cf26579452bf3c12b75af
Red Hat Security Advisory 2014-0949-01
Posted Jul 28, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0949-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-4699
SHA-256 | f9777ca1631aa2e4c1e414fb55781fb71e7081b5f670f58256119195823e51da
Debian Security Advisory 2991-1
Posted Jul 28, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2991-1 - Martin Holst Swende discovered a flaw in the way chunked requests are handled in ModSecurity, an Apache module whose purpose is to tighten the Web application security. A remote attacker could use this flaw to bypass intended mod_security restrictions by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header, allowing to send requests containing content that should have been removed by mod_security.

tags | advisory, remote, web
systems | linux, debian
advisories | CVE-2013-5705
SHA-256 | 0825c96504b99d210fe961acdb714473b46a1f7fcddf8251e31b0490e8e42c0c
Debian Security Advisory 2990-1
Posted Jul 28, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2990-1 - It was discovered that the web interface in CUPS, the Common UNIX Printing System, incorrectly validated permissions on rss files and directory index files. A local attacker could possibly use this issue to bypass file permissions and read arbitrary files, possibly leading to a privilege escalation.

tags | advisory, web, arbitrary, local
systems | linux, unix, debian
advisories | CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031
SHA-256 | cc938fc7d54d51a015c06e68ed74d219f09c0baf6016e28dce18fb4e2629a93b
Gentoo Linux Security Advisory 201407-05
Posted Jul 28, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201407-5 - Multiple vulnerabilities have been found in OpenSSL, possibly allowing remote attackers to execute arbitrary code. Versions less than 1.0.1h-r1 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2010-5298, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470
SHA-256 | 058715fbe6887e5fa7531493f741e2281a8b6fbd10beffa54560903e427c61b1
Page 2 of 16
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close