exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-12-04 to 2015-12-05

Atlassian HipChat for Jira Plugin Velocity Template Injection
Posted Dec 4, 2015
Authored by sinn3r, Chris Wood | Site metasploit.com

Atlassian Hipchat is a web service for internal instant messaging. A plugin is available for Jira that allows team collaboration at real time. A message can be used to inject Java code into a Velocity template, and gain code execution as Jira. Authentication is required to exploit this vulnerability, and you must make sure the account you're using isn't protected by captcha. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). HipChat for Jira plugin versions between 1.3.2 and 6.30.0 are affected. Jira versions between 6.3.5 and 6.4.10 are also affected by default, because they were bundled with a vulnerable copy of HipChat. When using the check command, if you supply a valid username and password, the module will be able to trigger the bug and check more accurately. If not, it falls back to passive, which can only tell if the target is running on a Jira version that is bundled with a vulnerable copy of Hipchat by default, which is less reliable. This vulnerability was originally discovered internally by Atlassian.

tags | exploit, java, web, code execution
systems | linux, windows
advisories | CVE-2015-5603
SHA-256 | 7b0bfc0538bdb0f09109fc89d00b2c3ecc20bb68190a05de1e6406e449f9841a
Ubuntu Security Notice USN-2829-2
Posted Dec 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2829-2 - It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash). Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2015-5283, CVE-2015-7872
SHA-256 | 5e4f710da8e8bbf54975fb1576d44e7ff897febc80e10c3dce85fa2a8b83ab06
Linksys EA6100 Wireless Router Authentication Bypass
Posted Dec 4, 2015
Authored by Matthew Bergin

Linksys EA6100 Wireless Router suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | a8b20e7d7ed604facccbb2ae990af80afdd4329520a1b779fb7446ad55de4272
Ubuntu Security Notice USN-2829-1
Posted Dec 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2829-1 - It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash). Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2015-5283, CVE-2015-7872
SHA-256 | e5abdf2008e62ef43b3ae503e90de529e5809783c88d0f8c0761fc3ccbd0f5fd
Red Hat Security Advisory 2015-2548-01
Posted Dec 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2548-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, web, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
SHA-256 | 5a605930055469bf0a06cb8720c4f0e40b41f82493a8b70826524ffdd3916e98
Red Hat Security Advisory 2015-2547-01
Posted Dec 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2547-01 - JBoss Operations Network provides an integrated solution for managing JBoss middleware, other network infrastructure, and applications built on Red Hat Enterprise Application Platform. The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
SHA-256 | cc8640c4388a4a895f95c581dafe20c6a1ab851a9fe6804f2c0d4d6cc2614a2f
Debian Security Advisory 3413-1
Posted Dec 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3413-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
SHA-256 | 1fec5f6d941764e515b2d41a23ffc157ba418d8fc1b688a8ca21684c204773b6
Debian Security Advisory 3412-1
Posted Dec 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3412-1 - Luca Bruno discovered an integer overflow flaw leading to a stack-based buffer overflow in redis, a persistent key-value database. A remote attacker can use this flaw to cause a denial of service (application crash).

tags | advisory, remote, denial of service, overflow
systems | linux, debian
advisories | CVE-2015-8080
SHA-256 | afd3b6ddf51da79e354679e67130888ebd595567efd5bfcc9f3992f00113e5ce
HP Security Bulletin HPSBGN03525 1
Posted Dec 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03525 1 - A potential security vulnerability has been identified in HP Performance Center Virtual Table Server (VTS). The vulnerability could be exploited remotely resulting in the execution of code. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-6857
SHA-256 | 20a02934713692b7735e8775e02907376bbec368c1790c6d65337a117d1ab5dd
WordPress Sell Download 1.0.16 Local File Disclosure
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress Sell Download plugin version 1.0.16 suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 6ff16b263dc80eedb9844cca7e1581b90e3a21d7503569de87d0ad55b2ba2797
Fortinet Cross Site Scripting
Posted Dec 4, 2015
Authored by Yann CAM

The login.fortinet.com site suffered from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 66571f8144851a8371be1d5f8d2edae17f7278739655c44af22a1cea57e1fcba
Linux x86/x86_64 execve Shellcode
Posted Dec 4, 2015
Authored by B3mB4m

Linux execve shellcode that works on both x86 and x86_64.

tags | x86, shellcode
systems | linux
SHA-256 | 19e5351ae10bc3f73a21d580af1b7b1a47863f13ef4d0768fd36034f64810e00
WordPress TheCartPress 1.4.7 Code Execution / Local File Disclosure
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress TheCartPress plugin version 1.4.7 suffers from code execution and local file disclosure vulnerabilities.

tags | exploit, local, vulnerability, code execution, info disclosure
SHA-256 | 154e643451779441be905f0e36b20623d19f59932732426b2c51832ab87df6db
WordPress Advanced Uploader 2.10 Shell Upload
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress Advanced Uploader plugin version 2.10 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | c84ffbb5a2da901b10a9231b2d47a0cd53878657e2c02246099c1a67a27b4476
iTop 2.2.0 Arbitrary File Upload
Posted Dec 4, 2015
Authored by Vadodil Joel Varghese

iTop version 2.2.0 suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
SHA-256 | 1b276a79cb1e82aff09696466a2f1cb4f6f6e358378c5b28e543f65cbfc8c122
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close