what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2013-02-18

Piwigo 2.4.6 Arbitrary File Read / Delete
Posted Feb 18, 2013
Authored by LiquidWorm | Site zeroscience.mk

Piwigo version 2.4.6 suffers from a remote arbitrary file read and deletion vulnerability user a directory traversal attack in install.php.

tags | exploit, remote, arbitrary, php
SHA-256 | e353029bcf9710e372f8537b68b34e571dbae6cc2766ccd07ecd7d446174397e
Debian Security Advisory 2628-1
Posted Feb 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2628-1 - Garth Mollett discovered that a file descriptor overflow issue in the use of FD_SET() in nss-pam-ldapd, which provides NSS and PAM modules for using LDAP as a naming service, can lead to a stack-based buffer overflow. An attacker could, under some circumstances, use this flaw to cause a process that has the NSS or PAM module loaded to crash or potentially execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2013-0288
SHA-256 | 7293e7af93c908b7309b1bbfd85a38e48c7bef2fec3f3dd808afeaa49befbae5
USB Sharp 1.3.4 Local File Inclusion / Cross Site Scripting
Posted Feb 18, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

USB Sharp version 1.3.4 suffers from local file inclusion and persistent cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 89b7ce758aba43e395f64df51494ad4141808360eba53cc694e6b93983671f8b
PHP-Fusion CMS 7.02.05 SQL Injection
Posted Feb 18, 2013
Authored by Krzysztof Katowicz-Kowalewski

PHP-Fusion CMS versions 7.02.01 through 7.02.05 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 8af2eceb6310de34f105ac3f1d63fa473bc238e02647218b091b5fa4cd42959e
Netgear DGN2200B Command Execution / Cross Site Scripting
Posted Feb 18, 2013
Authored by Michael Messner

Netgear DGN2200B suffers from remote command injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | 634264ce1a769f340ba92a3a358816a469ffa2e4015e8b04265695279dba696d
WordPress Marekkis Watermark Cross Site Scripting
Posted Feb 18, 2013
Authored by Aditya Balapure

WordPress Marekkis Watermark plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-1758
SHA-256 | c75b185c44998966c30a1f45dca46feb80b585a7fe45499c54e2c0f8bb7f8d36
TWiki 5.1.3 Command Execution
Posted Feb 18, 2013
Authored by Peter Thoeny

The %MAKETEXT{}% TWiki variable allows arbitrary shell command execution using tilde (~) characters. Only TWiki server with localization enabled are affected. Versions 5.1.0 through 5.1.3 suffer from this issue.

tags | advisory, arbitrary, shell
advisories | CVE-2012-6329, CVE-2013-1751
SHA-256 | 69ce1acdadc0b5a8985e3a80c2665154f577c3e6ce713f2e81c2207d4226efd5
WordPress Responsive Logo Slideshow Cross Site Scripting
Posted Feb 18, 2013
Authored by Aditya Balapure

WordPress Responsive Logo Slideshow plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-1759
SHA-256 | 1f8f832fe1392361e565eb2471f54ce920ce3a87626e68a557a19aa7475092c9
MIMEsweeper For SMTP 5.5 Cross Site Scripting
Posted Feb 18, 2013
Authored by Anastasios Monachos

MIMEsweeper for SMTP version 5.5 Personal Message Manager suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fd1e6d11db4e89634a1ec3e9c0b0e4b065a07b9bd8c9abc0e756f565ffef3052
Air Transfer 1.2.0 Local File Inclusion
Posted Feb 18, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Air Transfer version 1.2.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bd1b399f3fa1d8d95c53b2bbacb004e5332531f34c4eb77587f5eaaf2e9aa7b0
Debian Security Advisory 2627-1
Posted Feb 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2627-1 - Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL protocol when using compression. This side channel attack, dubbed 'CRIME', allows eavesdroppers to gather information to recover the original plaintext in the protocol. This update to nginx disables SSL compression.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2012-4929
SHA-256 | 502133805d72b568303783b87618bb62ad26a15d031b16dd58b9ca6d1e7cb802
Debian Security Advisory 2626-1
Posted Feb 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2626-1 - Several vulnerabilities were discovered in the TLS/SSL protocol. This update addresses these protocol vulnerabilities in lighttpd.

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2009-3555, CVE-2012-4929
SHA-256 | 5e292e8e54175e8e00b461c7e8f7fe9612ce8efb84127e0f77aa67d27dba9078
Ubuntu Security Notice USN-1727-1
Posted Feb 18, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1727-1 - It was discovered that the Boost.Locale library incorrectly validated some invalid UTF-8 sequences. An attacker could possibly use this issue to bypass input validation in certain applications.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2013-0252
SHA-256 | bcbf29b7785fd8ad48ae530299e64346f07140de1e4063acbd368c95dc890122
Open Review Script Cross Site Scripting
Posted Feb 18, 2013
Authored by TheMirkin

Open Review Script suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 41b6db4dd74c942b2e3863212ddd2842fd1b767666e34cefec257180661e40d2
Scripts Genie Pet Rate Pro 4.9.9 SQL Injection / Command Execution
Posted Feb 18, 2013
Authored by TheMirkin

Scripts Genie Pet Rate Pro version 4.9.9 suffers from remote SQL injection and code injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e55d6373fb5294f8a0c6fc9a3e933425b551b3bb554e7d3fea8131af660bef2d
ZeroClipboard 1.0.7 Cross Site Scripting
Posted Feb 18, 2013
Authored by MustLive

ZeroClipboard version 1.0.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | af0fb722151319ca3401d5bdc35794d73db7ab87076d7f0e2c5f17677005d202
PACK (Password Analysis and Cracking Kit) 0.0.3
Posted Feb 18, 2013
Authored by Peter Kacherginsky

PACK (Password Analysis and Cracking Kit) is a toolkit that allows researchers to optimize their password cracking tasks, analyze previously cracked passwords, and implements a novel attack on corporate passwords using minimum password policy. The goal of this toolkit is to assist in automatic preparation for the "better than bruteforce" password attacks by analyzing common ways that people create passwords. After the analysis stage, the statistical database can be used to generate attack masks for common tools such as Hashcat, oclHashcat, and others.

Changes: The latest update includes a rule generation engine (rulegen.py) which uses a Reverse Levenshtein Paths algorithm to reverse word mangling rules.
tags | tool, cracker
systems | unix
SHA-256 | aeac60e45a4d1bf191add36613a0e11f96afec1bb56b4a1a61e5c776e75f1ee9
Windows Manage User Level Persistent Payload Installer
Posted Feb 18, 2013
Authored by Brandon McCann, Thomas McCarthy | Site metasploit.com

This Metasploit module creates a scheduled task that will run using service-for-user (S4U). This allows the scheduled task to run even as an unprivileged user that is not logged into the device. This will result in lower security context, allowing access to local resources only. The module requires 'Logon as a batch job' permissions (SeBatchLogonRight).

tags | exploit, local
SHA-256 | cbb54215cefd21bbad843bf7ad1489f0dbdc50063f7fe9bb3f39430b2a7f556d
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close