what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Quest KACE System Management Appliance 8.0 (Build 8.0.318) XSS / Traversal / Code Execution / SQL Injection
Posted May 31, 2018
Authored by Core Security Technologies, Leandro Barragan, Guido Leo | Site coresecurity.com

Quest KACE System Management Appliance version 8.0 (Build 8.0.318) suffers from code execution, cross site scripting, path traversal, remote SQL injection, and various other vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection
advisories | CVE-2018-11132, CVE-2018-11133, CVE-2018-11134, CVE-2018-11135, CVE-2018-11136, CVE-2018-11137, CVE-2018-11138, CVE-2018-11139, CVE-2018-11140, CVE-2018-11141, CVE-2018-11142
SHA-256 | fd18c79b0364edc307ae0073788f224ea5fd016ba9223e6018267eb9911d3f41

Related Files

Accellion File Transfer Appliance MPIPE2 Command Execution
Posted Mar 14, 2011
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a chain of vulnerabilities in the Accellion File Transfer appliance. This appliance exposes a UDP service on port 8812 that acts as a gateway to the internal communication bus. This service uses Blowfish encryption for authentication, but the appliance ships with two easy to guess default authentication keys. This Metasploit module abuses the known default encryption keys to inject a message into the communication bus. In order to execute arbitrary commands on the remote appliance, a message is injected into the bus destined for the 'matchrep' service. This service exposes a function named 'insert_plugin_meta_info' which is vulnerable to an input validation flaw in a call to system(). This provides access to the 'soggycat' user account, which has sudo privileges to run the primary admin tool as root. These two flaws are fixed in update version FTA_8_0_562.

tags | exploit, remote, arbitrary, root, udp, vulnerability
SHA-256 | adc6990f1cf99e26413f21f398ece6121bbb6179c5ffc9a96eea0dee3107fd02
Secunia Security Advisory 43488
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service) and disclose potentially sensitive information.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | dbb59c26a4fdabdb6132581b336f2eea3542c7851382d8fd7025f7163eed4dce
Secunia Security Advisory 43458
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 7299c269130a7991d113d951b7ebb4ed6b85e1add8dbc40b9bfc0b09b356731d
Cisco Security Advisory 20110223-asa
Posted Feb 23, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances are affected by a transparent firewall packet buffer exhaustion vulnerability, a SCCP denial of service vulnerability, a RIP denial of service vulnerability, and an unauthorized file system access vulnerability.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-0393, CVE-2011-0394, CVE-2011-0395, CVE-2011-0396
SHA-256 | e76421e954aaa07cd6bf59eee71ec3dfe95a934bc32fb56fe6edae8a2ff01ed9
Secunia Security Advisory 43218
Posted Feb 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HD Moore has reported multiple vulnerabilities in Accellion File Transfer Appliance, which can be exploited by malicious, local users to disclose sensitive information and gain escalated privileges and by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
SHA-256 | 1f052e71d3c42be89da41ca1395232fcf10740cbd2841d1ce266870bf0b37457
Accellion File Transfer Appliance Multiple Vulnerabilities
Posted Feb 7, 2011
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Accellion File Transfer Appliance, prior to version FTA_8_0_562, suffers from a number of security flaws that can lead to a remote root compromise. These include issues like command injection, administrative tty check bypass, static passwords for privileged accounts, and more.

tags | exploit, remote, root
SHA-256 | 0a8e02333db7c5c6cf71307a3206cf3d0cad0322edd4b58872ca8c87a34994eb
Secunia Security Advisory 42931
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | f744c2892c05ced66a4a7afc42cfa077630f7b60708ccb87d8686545e05f728d
Secunia Security Advisory 42942
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | 059cb66f291658be78fd9af1bb8816490128415a85cb71c8c26c056a14b065b7
Cisco IPSec VPN Implementation Group Name Enumeration
Posted Dec 3, 2010
Site ngssecure.com

NGS Secure has discovered an enumeration vulnerability in (Cisco) Cisco VPN Concentrator, Cisco PIX and Cisco Adaptive Security Appliance.

tags | advisory
systems | cisco
SHA-256 | 36fee32442875e7c34fe81340c8ce76a9f75d1183377a5043c7a1e10371a76c1
Secunia Security Advisory 42414
Posted Nov 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to gain knowledge of certain information.

tags | advisory
systems | cisco
SHA-256 | b5ae965c5bb6f20748ae5916f5a0ae4551b829b73a4b7c28d4a780b806a39a03
Core Security Technologies Advisory 2010.1018
Posted Nov 11, 2010
Authored by Core Security Technologies, Aureliano Calvo | Site coresecurity.com

Core Security Technologies Advisory - A security vulnerability was discovered in LANDesk Management Suite: The Landesk web application does not sufficiently verify if a well-formed request was provided by the user who submitted the request. Using this information an external remote attacker can run arbitrary code using the 'gsbadmin' user (that is the user running the web-server). In order to be able to successfully make the attack, the administrator must be logged in to the appliance with the browser that the attacker uses to make the attack (for instance, exploiting a XSS in a different tab in the browser).

tags | exploit, remote, web, arbitrary
advisories | CVE-2010-2892
SHA-256 | 3dc2b0c9c31c4becfd753be92f87f46eef1496e094193a2f7775f7b49bd1734b
Proventia Network Mail Security System CRLF Injection
Posted Sep 14, 2010
Authored by Dr. Marian Ventuneac

Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6) is vulnerable to a CRLF Injection vulnerability. When exploited by an authenticated attacker, such vulnerability could lead to compromising the security of the appliance, allowing injection of custom HTTP cookies, forcing external redirects, potential HTTP Response Splitting attacks, etc.

tags | exploit, web, local
advisories | CVE-2010-0155
SHA-256 | e89f3a47c9d247e4c7ef74ea39c92a4c23d3b46381a0211b7b0b6dd059c87d44
Proventia Network Mail Security System Insecure Direct Object Reference
Posted Sep 14, 2010
Authored by Dr. Marian Ventuneac

Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6) is vulnerable to an Insecure Direct Object Reference vulnerability. When exploited by an authenticated attacker, such vulnerability could lead to compromising the security of the appliance, allowing OS command execution, local file inclusion resulting in exposure of appliance configuration files, source code, etc.

tags | exploit, web, local, file inclusion
advisories | CVE-2010-0154
SHA-256 | 4faf8158f2565688d604706ac1cf4006697d9a3c4dc9926cebbe5d8ab0579ade
Proventia Network Mail Security System Cross Site Scripting
Posted Sep 14, 2010
Authored by Dr. Marian Ventuneac

Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6 and 2.5) is vulnerable to multiple persistent and reflected XSS attacks. When exploited by an external/internal attacker, such identified vulnerabilities could lead to Session Hijack, Information Disclosure, force installation of malicious file or Trojan on users' PCs, etc.

tags | exploit, web, local, trojan, vulnerability, info disclosure
advisories | CVE-2010-0152
SHA-256 | 7d77648766361a40b7d96f7ef892d0dab12d44b36490044262f591af031bf755
Proventia Network Mail Security System Cross Site Request Forgery
Posted Sep 14, 2010
Authored by Dr. Marian Ventuneac

Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6 and 2.5) is vulnerable to XSRF attacks. When exploited by an attacker, the identified vulnerabilities could lead to compromising the security of the appliance, including unauthorized alteration of appliance's settings, DoS attacks, etc.

tags | advisory, web, local, vulnerability
advisories | CVE-2010-0153
SHA-256 | e79b5a9fb4e89af714cf275dfcd4e03761b0ba0e0db20144b1e00d48f36b7d68
Cisco Security Advisory 20100804-asa
Posted Aug 6, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
advisories | CVE-2010-1578, CVE-2010-1579, CVE-2010-1580, CVE-2010-1581, CVE-2010-2814, CVE-2010-2815, CVE-2010-2816, CVE-2010-2817
SHA-256 | 39cd6000cab98f829af61bf134f80406dff7844df55369514435f07d3e0cdecb
Secunia Security Advisory 40842
Posted Aug 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 0869d86e4e0d1927f18d50abc6307864fd633d09d3e8273f7915332c66f54193
EMC Celerra NAS root NFS Export Access
Posted Aug 3, 2010
Authored by Trustwave | Site trustwave.com

The EMC Celerra Network Attached Storage (NAS) appliance allows for unauthorized access to a root NFS export.

tags | advisory, root
advisories | CVE-2010-2860
SHA-256 | 7f8a55ea48522f9e3ff51e1ce2c01aa22c50783f5a13c5e6ad77041f33f1523f
VMware Security Advisory 2010-0011
Posted Jul 14, 2010
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware Studio 2.1 addresses security vulnerabilities in virtual appliances created with Studio 2.0.

tags | advisory, vulnerability
advisories | CVE-2010-2427, CVE-2010-2667
SHA-256 | 0db53c597e93d42d1dc1c70847ad8b7ad162e5bfd7ee81e6fd69c060ab801465
InterScan Web Security Virtual Appliance 5.0 Cross Site Scripting
Posted Jul 2, 2010
Authored by Ivan Huertas | Site cybsec.com

InterScan Web Security Virtual Appliance version 5.0 suffers from a permanent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | d60343329b98b29fcbff997e59b730f730f821f2e44103c45085db4e6f514328
Secunia Security Advisory 40328
Posted Jun 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Trend Micro InterScan Web Security Virtual Appliance, which can be exploited by malicious users to disclose potentially sensitive information or compromise a vulnerable system, and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, web, vulnerability, csrf
SHA-256 | a0681c7eefd99d0f2764f58b138c0a8dfb67d04cdfcd62a27bac8a3f6babbba1
Cisco ASA HTTP Response Splitting
Posted Jun 26, 2010
Authored by Daniel King

Cisco Adaptive Security Appliance (ASA) is vulnerable to HTTP response splitting caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim?s web browser within the security context of the Adaptive Security Appliance site. Versions 8.1(1) and earlier are affected.

tags | exploit, remote, web
systems | cisco
advisories | CVE-2008-7257
SHA-256 | 3064d44bee1b7468da72c1186ac4343d80636c9c5e6f3943f1d2992b6d3100b1
Secunia Security Advisory 39275
Posted Apr 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in TANDBERG Video Communication Server, which can be exploited by malicious users to disclose sensitive information, and by malicious people to conduct hijacking attacks and potentially compromise a vulnerable appliance.

tags | advisory, vulnerability
SHA-256 | 1b5f6a02031dc444d2ff506eaf260738ce1068e4785e3c4b23a5c70be4b01708
Tandberg VCS Authentication Bypass
Posted Apr 12, 2010
Authored by Timothy D. Morgan | Site vsecurity.com

Virtual Security Research, LLC. Security Advisory - On December 2nd, VSR identified an authentication bypass vulnerability in TANDBERG's Video Communication Server, firmware version x4.2.1. This vulnerability allows for the complete bypass of authentication in the administrative web console. Since this web interface can be used to execute arbitrary code on the appliance as root (via software updates), the severity is considered critical.

tags | advisory, web, arbitrary, root, bypass
advisories | CVE-2009-4509
SHA-256 | db51c425156ad6e9f3fa40fb9a1383e98edfded1cb0710c6c58c4a658f0b3a0b
Tandberg VCS Static SSH Host Keys
Posted Apr 12, 2010
Authored by Timothy D. Morgan | Site vsecurity.com

Virtual Security Research, LLC. Security Advisory - On December 2nd, VSR identified a SSH service authentication weakness vulnerability in the TANDBERG's Video Communication Server. This issue would allow an attacker with privileged network access to conduct server impersonation and man-in-the-middle attacks on administrator SSH sessions. Successful attacks could yield shell access to vulnerable appliances.

tags | advisory, shell
advisories | CVE-2009-4510
SHA-256 | 5d59b48678f9f742a235347210d3b7f85ea422e15a8e88168874895fb1bf8af4
Page 3 of 4
Back1234Next

File Archive:

October 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    0 Files
  • 2
    Oct 2nd
    22 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close