what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-07-06 to 2016-07-07

GNU Wget Arbitrary File Upload / Potential Remote Code Execution
Posted Jul 6, 2016
Authored by Dawid Golunski

GNU Wget versions prior to 1.18 suffer from an arbitrary file upload vulnerability that may allow for remote code execution.

tags | exploit, remote, arbitrary, code execution, file upload
advisories | CVE-2016-4971
SHA-256 | 3ebf4d81b9c108e57502040e8018d849ca791f68c50a3e363db8ee6554556d53
EMC Avamar Data Store / Virtual Edition Unauthorized Data Access
Posted Jul 6, 2016
Site emc.com

EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) have released a fix for a vulnerability that may potentially lead to denial of service and data disclosure. When restoring backups of Linux Avamar clients using the web restore interface, a malicious Avamar Client user may read and/or delete critical directories on the Avamar Server. This may lead to a denial-of-service attack on the Avamar Server, or unauthorized access to Avamar Server data by the malicious Avamar Client user. All supported versions prior to 7.3.0 of EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) are affected.

tags | advisory, web, denial of service
systems | linux
advisories | CVE-2016-0906
SHA-256 | 572a5c2a703d7f692f7e1966646f0725a31f3596c40aa8ddb112bc055aaa002c
AWBS 2.9.6 SQL Injection / Cross Site Scripting
Posted Jul 6, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

AWBS version 2.9.6 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 1675afe8e039059668317602ec43e19933d8f670b5ec636629c17e9161d7743b
RS232-NET Converter (JTC-200) CSRF / Weak Credentials / Unauthenticated Access
Posted Jul 6, 2016
Authored by Karn Ganeshen

RS232-NET Converter (JTC-200) suffers from cross site request forgery and weak credential management vulnerabilities along with unauthenticated access over telnet.

tags | exploit, vulnerability, bypass, csrf
SHA-256 | f40c27189efefaddaf076e2f7f0a039c4c3ecdf9474cf872b0c3d27fd919c72b
CIMA DocuClass ECM CSRF / XSS / SQL Injection
Posted Jul 6, 2016
Authored by Karn Ganeshen

CIMA DocuClass ECM suffers from cross site request forgery, cross site scripting, direct object reference, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | e59340b8b2d2736f3f23ac644c82482a122095cf376b184333e25aefc5c3d6b6
OpenFire 4.0.1 Cross Site Request Forgery / Cross Site Scripting
Posted Jul 6, 2016
Authored by Florian Nivette

OpenFire versions 3.10.2 through 4.0.1 suffer from cross site request forgery and cross site scripting vulnerabilities. These issues are similar as findings discovered by hyp3rlinx but leverage different pages.

tags | exploit, vulnerability, xss, csrf
SHA-256 | be513ac2a1d466d9fc24adcadf3d11b3c22f9970e5d75746d50da08647e6334e
PrinceXML Wrapper Class Command Injection
Posted Jul 6, 2016
Authored by Brandon Perry

Wrapper classes provided by PrinceXML appear to suffer from command injection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | af3f900b8ea8475a7548d9c557b237e3693679f81551df21a63dddf1a022c03f
Micron CMS 5.3 SQL Injection
Posted Jul 6, 2016
Authored by Vulnerability Laboratory, mr_mask_black | Site vulnerability-lab.com

Micron CMS version 5.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3c36fe67d394ea751c57236ea8cd40e2dcbd72d899747169f1be3761450e74b5
GNU Transport Layer Security Library 3.4.14
Posted Jul 6, 2016
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
SHA-256 | 35deddf2779b76ac11057de38bf380b8066c05de21b94263ad5b6dfa75dfbb23
Samsung Android JACK Privilege Escalation
Posted Jul 6, 2016
Authored by Google Security Research, Mark Brand

The usermode audio subsystem for the "Samsung Android Professional Audio" is based on JACK and appears to suffer from a privilege escalation vulnerability.

tags | advisory
systems | linux
SHA-256 | 6e6f5be9346ce92749741f62f51847396d676dba887f707954ead81bbe16e561
Samsung Android JACK ASLR Bypass
Posted Jul 6, 2016
Authored by Google Security Research, Mark Brand

The usermode audio subsystem for the "Samsung Android Professional Audio" is based on JACK, which appears to be designed for single-user usage. The common JACK configuration on Linux systems appears to be a JACK server running under the current user account, and interacting with JACK clients from the same user account; so with a minimal privilege difference; this is not the case with the configuration on Android, where the JACK service runs as a more privileged user in a less restrictive SELinux domain to the clients that can connect to it. The JACK shared memory implementation uses the struct jack_shm_info_t defined in /common/shm.h to do some bookkeeping. This struct is stored at the start of every JackShmAble object. This means that whenever the JACK server creates an object backed by shared memory, it also stores a pointer to that object (in the address space of the JACK server), allowing a malicious client to bypass ASLR in the JACK server process.

tags | advisory
systems | linux
SHA-256 | 154f9eac96eeb68b35b32d286401c145dafcaee91d33e5328b096764d282a114
GNU Transport Layer Security Library 3.3.24
Posted Jul 6, 2016
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
SHA-256 | 5b65fe2a91c8dfa32bedc78acffcb152e5426cd3349e2afc43cccc9bdaf18aa5
Teampass 2.1.26 Arbitrary File Upload
Posted Jul 6, 2016
Authored by Vulnerability Laboratory, Peter Kok | Site vulnerability-lab.com

Teampass version 2.1.26 suffers from a remote authenticated file upload vulnerability that may allow for code execution.

tags | exploit, remote, code execution, file upload
SHA-256 | d336842a50b3aaa3e3071e1f1915eb0894fa880d18d7e17f80ee3c508fd8a08c
IBM BlueMix Cloud Script Insertion
Posted Jul 6, 2016
Authored by Vulnerability Laboratory, Digvijay Singh | Site vulnerability-lab.com

IBM BlueMix Cloud suffers from a client-side malicious script insertion vulnerability.

tags | exploit
SHA-256 | 43ae57eacfa2eb6a617d2b40733bb1248a1580601e9efdf40337d67e76e94fc3
Packet Fence 6.2.0
Posted Jul 6, 2016
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Updated translations, versions, and news.
tags | tool, remote
systems | unix
SHA-256 | 2012c67cd740a69e563d26ca0e7d812f3e54b8735020a1af877f04c3e7429695
Nagios XI Chained Remote Code Execution
Posted Jul 6, 2016
Authored by wvu, Francesco Oddo | Site metasploit.com

This Metasploit module exploits an SQL injection, auth bypass, file upload, command injection, and privilege escalation in Nagios XI <= 5.2.7 to pop a root shell.

tags | exploit, shell, root, sql injection, file upload
SHA-256 | 7b076eb4c293543ed664b1e38b4942197ec5fe84ee01dda8591020258e48df90
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close