exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation
Posted Jul 7, 2022
Authored by James Forshaw, Google Security Research

On Windows 11, the Kerberos SSP's KerbRetrieveEncodedTicketMessage message can be used to get an arbitrary service ticket and session key from an AppContainer even without the enterprise authentication capability leading to elevation of privilege.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2022-30164
SHA-256 | 78434d5ce4cfd024dc8d980cdbc2c6c5bfc491c59fd75bca49f3b74f62b3a77a

Related Files

Mandriva Linux Security Advisory 2012-066
Posted Apr 27, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-066 - Security issues were identified and fixed in Mozilla Firefox and Thunderbird. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG found a heap corruption in gfxImageSurface which allows for invalid frees and possible remote code execution. Anne van Kesteren of Opera Software found a multi-octet encoding issue where certain octets will destroy the following octets in the processing of some multibyte character sets. Various other issues were also addressed.

tags | advisory, remote, code execution
systems | linux, mandriva
advisories | CVE-2012-0468, CVE-2012-0467, CVE-2012-0469, CVE-2012-0470, CVE-2012-0471, CVE-2012-0472, CVE-2012-0473, CVE-2012-0474, CVE-2012-0477, CVE-2012-0478, CVE-2011-3062, CVE-2012-0479
SHA-256 | 52c7580faddde89c8ddd93ee504f0bd91f907d7b0db98c6e88c400c8de82300c
PacketVideo TwonkyServer / TwonkyMedia Directory Traversal
Posted Apr 26, 2012
Authored by Digital Defense, r@b13$ | Site digitaldefense.net

Multiple PacketVideo products contain a directory traversal vulnerability within the web server that is running on port 9000. These products are vulnerable to the attack regardless of having configured the "Secured Server Settings" which are available on the Advanced configuration page. Susceptible products include the Twonky 7.0 Special and the TwonkyManager 3.0.

tags | advisory, web
SHA-256 | d7cc75961c0a51603edd705eddc5a0af411e1503f0174c5d5cefe48addcd4c14
Red Hat Security Advisory 2012-0519-01
Posted Apr 25, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0519-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. This release of JBoss Enterprise Portal Platform 5.2.1 serves as a replacement for JBoss Enterprise Portal Platform 5.2.0, and includes bug fixes.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2011-4314, CVE-2012-0818
SHA-256 | 4c2d7e867f2236c82154ad3fdca5b623e021c311c49562d7e1ef097fb83249f5
Ubuntu Security Notice USN-1400-5
Posted Apr 20, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1400-5 - USN-1400-1 fixed vulnerabilities in Firefox. Firefox 11 started using GSettings to access the system proxy settings. If there is a GSettings proxy settings schema, Firefox will consume it. The GSettings proxy settings schema that was shipped by default was unused by other applications and broke Firefox's ability to use system proxy settings. This update removes the unused schema. Various other issues were also addressed.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2012-0455, CVE-2012-0457, CVE-2012-0456, CVE-2012-0451, CVE-2012-0458, CVE-2012-0459, CVE-2012-0460, CVE-2012-0462, CVE-2012-0464
SHA-256 | 07e1cf6fd8987b086263aacb60563d76b5fd0d0116bf4c2083136d6fc4896fd2
GSM SIM Editor 5.15 Buffer Overflow
Posted Apr 18, 2012
Authored by Ruben Alejandro | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in GSM SIM Editor 5.15. When opening a specially crafted .sms file in GSM SIM Editor a stack-based buffer overflow occurs which allows an attacker to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 451d9fa4a2e617e48ce85c48c985cb871ef37c17216ab0ee454a7063cff0d329
RadioGraPhy Forensic Tool
Posted Apr 16, 2012
Site security-projects.com

Radiography is a forensic tool which grabs as much information as possible from a Windows system. It checks registry keys related to start up processes, registry keys with Internet Explorer settings, host file contents, taskScheduler tasks, loaded system drivers, uses WinUnhide to catch hidden processes, and does much more.

tags | tool, registry, forensics
systems | windows
SHA-256 | be7394b4ce9a474ce4d3c0d3ddd25f7e3f4940ae86f346304bfb881bc6e41ad4
NIELD (Network Interface Events Logging Daemon) 0.23
Posted Apr 11, 2012
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.

Changes: This release includes minor updates and bugfixes.
tags | tool, kernel, system logging
systems | linux, unix
SHA-256 | e1ec1bc25bc337a1942e74d7c07a0a9782a3728905f92f633204d8c7be267b17
BGS CMS 2.2.1 Cross Site Scripting
Posted Apr 11, 2012
Authored by LiquidWorm | Site zeroscience.mk

BGS CMS version 2.2.1 suffers from multiple stored and reflected cross site scripting vulnerabilities when parsing user input to several parameters via GET and POST method (post-auth). Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

tags | exploit, arbitrary, vulnerability, xss
SHA-256 | 1a474163f17dc1462181f57315dc71f8d56003df79de9b6b8db2e147abf40c76
Sagan Log Monitor 0.2.1
Posted Apr 6, 2012
Authored by Champ Clark III | Site sagan.softwink.com

Sagan is multi-threaded, real-time system- and event-log monitoring software, but with a twist. Sagan uses a "Snort" like rule set for detecting nefarious events happening on your network and/or computer systems. If Sagan detects a "bad thing" happening, it can do a number of things with that information. Sagan can also correlate the events with your Intrusion Detection/Intrusion Prevention (IDS/IPS) system and basically acts like an SIEM (Security Information and Log Management) system.

Changes: Several bug fixes and code clean up.
tags | tool, sniffer
systems | unix
SHA-256 | 6c4fe7128a01c6f309bd181563c54cdf0abf2f623db78e0207f9c69176b15858
Cisco Security Advisory 20120404-webex
Posted Apr 5, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com. If the WRF player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | cisco
SHA-256 | 5a6fd0961849fbf9e0e2f35c8d9ff27609e9c090b4f86b93378ccddd00e0762d
How Much Facebook Is Secure
Posted Apr 1, 2012
Authored by Akash Shukla

This is a brief paper that describes how sending external email to an account automatically maps things like a graphic if a person's personal email address maps to it. We tested this and it does work, but Facebook does add a little icon saying the sender isn't verified. However, the average user will probably overlook this.

tags | exploit
SHA-256 | 5b503a91fa75c821b880ed02d9f1bfcea98221c81d919e117cbfcd16eade343f
Secunia Security Advisory 48381
Posted Apr 1, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and a vulnerability have been reported in ZyXEL GS1510, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4d2a966d89c83d70c8d5e9c8dd28640d76c035a3e3dcf47f7560d72699065eb3
OWASP Global AppSec Research (EU) Conference 2012 Call For Papers
Posted Mar 29, 2012
Site easychair.org

In 2012, OWASP is holding its Global AppSec Research (EU) Conference in Athens, Greece! The OWASP AppSec Research conference is a premier gathering for Information Security leaders and researchers. It brings together the application security community to share cutting-edge ideas, initiatives and technology advancements. The Call For Papers is now open.

tags | paper, conference
SHA-256 | b67ff68635b0da527a9389e954b4fa15fc435fa409b274cf649d45bc21db5d36
WordPress Deans With Pwwangs Code Shell Upload
Posted Mar 29, 2012
Authored by T0xic

WordPress Deans with Pwwangs Code plugin suffers from a FCKeditor remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | 0c816792c3ca6a0b7d63857f24ed1e793ca83dd33846e3484963e4614bb59655
Samhain File Integrity Checker 3.0.3
Posted Mar 28, 2012
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Some bugs that could lead to deadlocks have been fixed, as well as the missing support for O_NOATIME on 64-bit Linux.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | c8c3069e78dcb8b749a066c7c3bfcea1168243f75afe69a91a6330c99efd9ae4
360-FAAR Firewall Analysis Audit And Repair 0.2.0
Posted Mar 27, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This version includes support for cisco ASA global host, subnet and range objects as well as most service object types and identifiers. The cisco defaults list is better and the source policy usage field in print mode now prints correct info. Also, all three policy readers have been upgraded to detect unknown objects in groups and policies during the initial policy read and the untimely large range printing in print modes is now fixed.
tags | tool, perl
systems | unix
SHA-256 | fe044230036d848ad6720383afa9e61319b0004de5ccf5aedc1b26ee3e6ced82
360-FAAR Firewall Analysis Audit And Repair 0.1.9
Posted Mar 23, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release provides a work around for netscreen objects identified by DNS name in the config and adds new fields to the 'print' modes spreadsheet. These fields list services in use in relation to objects and rules as well as usage info from the log file and hit counts.
tags | tool, perl
systems | unix
SHA-256 | e40867ec2b07662d86f8ccbf48ffce4f61c258d21758a358af57368530200887
360-FAAR Firewall Analysis Audit And Repair 0.1.8
Posted Mar 19, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds support for cisco 'group-object' nested groups and a cisco policy writer.
tags | tool, perl
systems | unix
SHA-256 | 42173590795645e2f9e4219d77b6699b9a6ca4563946c65ff2773b7d9c831693
360-FAAR Firewall Analysis Audit And Repair 0.1.7
Posted Mar 15, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds a Cisco asa log reader and fixes many bugs in the Cisco and Netscreen policy readers.
tags | tool, perl
systems | unix
SHA-256 | 88fc63ec0972b2501852fc4f0e3308b885982bd391d185e2e5897765d93e3d45
ZyXel GS1510 Cross Site Scripting
Posted Mar 13, 2012
Authored by Neil Fryer

The ZyXel GS1510 web frontend suffers from cross site scripting and password submission over HTTP vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 7bf039aa909839bc91b9955ca5263119afc35507902d82b8af6626a2ab2bd5f9
Ubuntu Security Notice USN-1398-1
Posted Mar 13, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1398-1 - Tenho Tuhkala discovered that the LTSP Display Manager (ldm) incorrectly filtered keybindings. An attacker could use the default keybindings to execute arbitrary commands as root at the login screen.

tags | advisory, arbitrary, root
systems | linux, ubuntu
advisories | CVE-2012-1166
SHA-256 | 7ce1e6e2ce3facc78d68784fa8ed22148f48cebd6fdfe476a93f740c51212ff3
360-FAAR Firewall Analysis Audit And Repair 0.1.6
Posted Mar 9, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: Now reads PIX and ASA standard and extended access-lists, objects and groups Has two new modes, 'print' and 'fltprint' that provide full object analysis or filtered object analysis respectively. Many bug fixes.
tags | tool, perl
systems | unix
SHA-256 | 7a17b614015f0e9b25e58e0aaa9455ba25a8a9423f1ab726fa46481fb5a83571
Ubuntu Security Notice USN-1392-1
Posted Mar 7, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1392-1 - Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit this to cause a denial of service or escalate privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2011-2182
SHA-256 | e3a1cb2d59c53f8534bcc574cde849ab64541e6674e02b848509d7c0c55f2c23
Ubuntu Security Notice USN-1384-1
Posted Mar 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1384-1 - A bug was discovered in the Linux kernel's calculation of OOM (Out of memory) scores, that would result in the wrong process being killed. A user could use this to kill the process with the highest OOM score, even if that process belongs to another user or the system. Paolo Bonzini discovered a flaw in Linux's handling of the SG_IO ioctl command. A local user, or user in a VM could exploit this flaw to bypass restrictions and gain read/write access to all data on the affected block device. Various other issues were also addressed.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2011-4097, CVE-2011-4127, CVE-2011-4622, CVE-2012-0038, CVE-2012-0055, CVE-2012-0207, CVE-2011-4097, CVE-2011-4127, CVE-2011-4622, CVE-2012-0038, CVE-2012-0055, CVE-2012-0207
SHA-256 | ba35da89b5eae8117d31f718c99da404c1ff80d437df5bc034c13a24bb0b4c94
Joomla Web Scanner 1.3
Posted Oct 30, 2011
Authored by Pepelux | Site enye-sec.org

Joomla web scanning perl script that gets the version, components and shows possible bugs.

Changes: Version 1.3 now recognizes Joomla! versions up to 1.7.2 and shows possible bugs in the core and components.
tags | tool, web, scanner, perl
systems | unix
SHA-256 | dbf6afebc08cfab8556c7d449c2714a2f927de9e575f463d09ddc670e6dbb60d
Page 4 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close