This Metasploit module will attempt to create a persistent payload in a new volume shadow copy. This is based on the VSSOwn Script originally posted by Tim Tomes and Mark Baggett. This Metasploit module has been tested successfully on Windows 7. In order to achieve persistence through the RUNKEY option, the user should need password in order to start session on the target machine.
d72c7c4197223719655c0deb2854e9abd093b3ef32540cca84b41979d20922b1
HP Security Bulletin HPSBMU02931 - A potential security vulnerability has been identified with HP Service Manager. The vulnerabilities could be exploited to allow injection of arbitrary code, remote disclosure of privileged Information, improper privilege management and cross site scripting (XSS). Revision 1 of this advisory.
92bd5016fb046657c3c2e38cc64e059c20f29bb7aaf7ad5967b91d4e1737e1b6
Dolibarr ERP/CMS version 3.4.0 suffers from a remote SQL injection vulnerability.
17558383b563f3fc59b866cd4454a1c3f1b147cd861e3918baa96316db448057
Red Hat Security Advisory 2013-1429-01 - The Apache Commons FileUpload component can be used to add a file upload capability to your applications. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. All users of Red Hat JBoss Web Server 1.0.2 as provided from the Red Hat Customer Portal are advised to apply this update.
e4609645f4cd637011a2643599aa3263a831c9a6435202a828d6adef065e469f
Red Hat Security Advisory 2013-1426-01 - X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. A use-after-free flaw was found in the way the X.Org server handled ImageText requests. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges.
d72ffb1f45e9412968049f5b566eaaed14e469d38fd22929209af914c61bb2d6
Red Hat Security Advisory 2013-1430-01 - The Apache Commons FileUpload component can be used to add a file upload capability to your applications. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. All users of the affected products as provided from the Red Hat Customer Portal are advised to apply this update.
8b2547fa6d3975c3a91727576e45109a28a17517cad7448a131a2f7b6230c3f5
Red Hat Security Advisory 2013-1428-01 - The Apache Commons FileUpload component can be used to add a file upload capability to your applications. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. Warning: Before applying the update, back up your existing Red Hat JBoss Enterprise Web Server installation.
b976071b14d373df151db7787b9d20fe22a7a606d389e8f152187779ade395e2
Red Hat Security Advisory 2013-1427-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. RubyGems is the Ruby standard for publishing and managing third-party libraries. It was discovered that the rubygems API validated version strings using an unsafe regular expression. An application making use of this API to process a version string from an untrusted source could be vulnerable to a denial of service attack through CPU exhaustion.
95b8c5fb8466ea5aaac7d7ca6845aee4834cc8fe67daa4ad63e92c66a8847521
Slackware Security Advisory - New gnupg2 packages are available for Slackware 13.37, 14.0, and -current to fix security issues. These packages will require the updated libgpg-error package. Related CVE Numbers: CVE-2013-4402.
dda1058a769536c2ddb2b2d2a402ff01901c6e6d245c08d55af69271767b813e
Ubuntu Security Notice 1989-1 - It was discovered that ICU contained a race condition affecting multi- threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS and Ubuntu 12.10. It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. Various other issues were also addressed.
4c985d7e31139c62df2e58886e91c67008a1ebe7ced54b4fc3bb9bc1c895190c
Slackware Security Advisory - New xorg-server packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. Related CVE Numbers: CVE-2013-4396.
d63fcb06cd8e5c354fdbceb85314bd6e9bee0b0da684642768e3b3bfb2dce838
Slackware Security Advisory - New gnupg packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. Related CVE Numbers: CVE-2013-4402.
063e6988f3bde3da3e28b4a1c8e9e1bc4231c00ecc5f86bc612cc24d0d7ebb14
Slackware Security Advisory - New gnutls packages are available for Slackware 12.1, 12.2, 13.0, 13.1, and 13.37 to fix security issues. Related CVE Numbers: CVE-2011-4128,CVE-2012-1569,CVE-2012-1573,CVE-2013-1619,CVE-2013-2116.
13905ed94cfe14682c1c5c14c16132d41f098ff84047a15e976344d2814c839d
Slackware Security Advisory - New libgpg-error packages are available for Slackware 13.37 and 14.0. These are needed for the updated gnupg2 package.
5e8cd960335dd818981514837c916a4e6228aa26175b4ef7bf5cd49aa11e7aad
DornCMS Application version 1.4 suffers from cross site scripting and local file inclusion vulnerabilities.
effa62cb4eaaa12b0a23ca9706a0f1cc9087f8d782f16c149fece649db7b3103
WordPress Dexs PM System plugin suffers from a persistent cross site scripting vulnerability.
46585f05ce1c8abf03275497ab4ed1b5a5b1fe6f2f5d454627d66da4e26a2725
Aladdin Knowledge Systems Ltd. PrivAgent active-x control overflow exploit.
78e1f9941ee243de2c6fa4f4dd4d806f45dbe201a8b08daf54b144678052bb4f