exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-04-02

PonyOS 0.4.99-mlp Privilege Escalation
Posted Apr 2, 2013
Authored by John Cartwright

PonyOS version 0.499-mlp suffers from privilege escalation due to the cat binary being executed with escalated privileges and file permissions do not work. It also has a kernel compromise vulnerability.

tags | exploit, kernel
SHA-256 | 3cc9c88954c40969dd91bdad93080b62fc386a7022593ded5062531355365a12
MongoDB nativeHelper.apply Remote Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits the nativeHelper feature from spiderMonkey which allows control over execution by calling it with specially crafted arguments. This Metasploit module has been tested successfully on MongoDB 2.2.3 on Ubuntu 10.04 and Debian Squeeze.

tags | exploit
systems | linux, debian, ubuntu
advisories | CVE-2013-1892, OSVDB-91632
SHA-256 | b6eb069e8c2cd7a54405a167b66ff710e28f82ed3b1979ede3aca6f9223c3ab8
Linksys E1500/E2500 apply.cgi Remote Command Injection
Posted Apr 2, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Some Linksys Routers are vulnerable to an authenticated OS command injection. Default credentials for the web interface are admin/admin or admin/password. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes.

tags | exploit, web
advisories | OSVDB-89912
SHA-256 | b0afd45182320ce4cbe58cfbaef05397334c74a08e5a150118bf0469c6dc9d01
HP System Management Anonymous Access Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits an anonymous remote code execution on HP System Management 7.1.1 and earlier. The vulnerability exists when handling the iprange parameter on a request against /proxy/DataValidation. In order to work HP System Management must be configured with Anonymous access enabled.

tags | exploit, remote, code execution
advisories | OSVDB-91812
SHA-256 | 4de4f77423b06dccacf83fd32f5fcf5e7397ce23516f9f320983cc32b12d3691
Novell ZENworks Configuration Management Remote Execution
Posted Apr 2, 2013
Authored by James Burton, juan vazquez | Site metasploit.com

This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3.

tags | exploit, arbitrary, code execution
systems | linux, windows, suse
advisories | CVE-2013-1080, OSVDB-91627
SHA-256 | cac2ca5c89d3eedff27bc84da293cd736f6780ad4a09e145d499b111dfd7d70d
Ubuntu Security Notice USN-1785-1
Posted Apr 2, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1785-1 - It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or possibly execute arbitrary code with privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-1788, CVE-2013-1789, CVE-2013-1790
SHA-256 | a47e45dc4222448ec57f8e6f7b41b29f28cd6282feaa9c9ce0799129d033cf9d
Ubuntu Security Notice USN-1784-1
Posted Apr 2, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1784-1 - Nicholas Gregoire discovered that libxslt incorrectly handled certain empty values. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2012-6139
SHA-256 | 82799b8952809a1e54444c0c50a802c0ad5f4c59e730c7db6c1db26241d1361e
360-FAAR Firewall Analysis Audit And Repair 0.4.1
Posted Apr 2, 2013
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds the 'mergelog' mode to merge binary log entries from one config with another and significantly updates the user interface. All configs can be loaded from the 'load' menu instead of specifying them on the command line. Added 'verbose' switches to 'print' and 'rr' modes so that screen output can be switched off, and all 'end.' key words have been changed to simply '.' to reduce the number of keystrokes needed. Entering '0' now adds all options and '.' chooses the default if available. The Netscreen output stage now uses a default zone if none are specified.
tags | tool, perl
systems | unix
SHA-256 | a54666e93f8139c9c290eb8d0f049a718401c5cb7c9ff5e4da4b80f47982adb0
Red Hat Security Advisory 2013-0699-01
Posted Apr 2, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0699-01 - Ruby on Rails is a model–view–controller framework for web application development. Active Record implements object-relational mapping for accessing database entries using objects. A flaw was found in the way hashes were handled in certain queries. A remote attacker could use this flaw to perform a denial of service attack by sending specially-crafted queries that would result in the creation of Ruby symbols, which were never garbage collected.

tags | advisory, remote, web, denial of service, ruby
systems | linux, redhat
advisories | CVE-2013-1854
SHA-256 | b6902657cfe40401e0c98cb2a92a85ea972342fafdcaf8a44cc480e5c5cd61a1
Red Hat Security Advisory 2013-0698-01
Posted Apr 2, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0698-01 - Ruby on Rails is a model–view–controller framework for web application development. Action Pack implements the controller and the view components. Two cross-site scripting flaws were found in rubygem-actionpack and ruby193-rubygem-actionpack. A remote attacker could use these flaws to conduct XSS attacks against users of an application using rubygem-actionpack or ruby193-rubygem-actionpack.

tags | advisory, remote, web, xss, ruby
systems | linux, redhat
advisories | CVE-2013-1855, CVE-2013-1857
SHA-256 | 743a41b0704bd4dba9f8cb3988806f1e991875ad4a177217c9ca713b7d10655b
Red Hat Security Advisory 2013-0697-01
Posted Apr 2, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0697-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. A flaw was found in the way Same Origin Wrappers were implemented in Thunderbird. Malicious content could use this flaw to bypass the same-origin policy and execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2013-0788, CVE-2013-0793, CVE-2013-0795, CVE-2013-0796, CVE-2013-0800
SHA-256 | 74494867652c4cbc9d5829137fb1894e0f25d7fb1b710f739ad05f79ae484d82
Red Hat Security Advisory 2013-0696-01
Posted Apr 2, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0696-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A flaw was found in the way Same Origin Wrappers were implemented in Firefox. A malicious site could use this flaw to bypass the same-origin policy and execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2013-0788, CVE-2013-0793, CVE-2013-0795, CVE-2013-0796, CVE-2013-0800
SHA-256 | 6316d8cb6d761c86b94001dbf1829e2a5f2841ae9527a42166c87f8f8bb3c594
Red Hat Security Advisory 2013-0695-01
Posted Apr 2, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0695-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A race condition was found in the way the Linux kernel's ptrace implementation handled PTRACE_SETREGS requests when the debuggee was woken due to a SIGKILL signal instead of being stopped. A local, unprivileged user could use this flaw to escalate their privileges.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2013-0871
SHA-256 | dd860a32760eeb4ee121f06db3c51a0cbd4af326851129ef506607a436dedd76
WHMCS Grouppay 1.5 SQL Injection
Posted Apr 2, 2013
Authored by HJauditing Employee Tim

WHMCS Grouppay plugin versions 1.5 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b304a2f0298f4ebff558dc745a1da74d9a5e6cedcfe956f2fc1f606759a2b27f
Virtual Access Monitor SQL Injection
Posted Apr 2, 2013
Authored by Ken Wolstencroft | Site nccgroup.com

NCC Group has discovered multiple SQL injection vulnerabilities in Virtual Access Monitor. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, vulnerability, sql injection
SHA-256 | 936fbe2a15d567292c6f111a3e024b35c22de77119e739eda6031b3184566fcf
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close