exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2014-02-26 to 2014-02-27

Symantec Endpoint Protection Manager Remote Command Execution
Posted Feb 26, 2014
Authored by Chris Graham, Stefan Viehboeck | Site metasploit.com

This Metasploit module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager versions 11.0, 12.0 and 12.1. When supplying a specially crafted XXE request an attacker can reach SQL injection affected components. As xp_cmdshell is enabled in the included database instance, it's possible to execute arbitrary system commands on the remote system with SYSTEM privileges.

tags | exploit, remote, arbitrary, sql injection, xxe
advisories | CVE-2013-5014, CVE-2013-5015
SHA-256 | ef19d7abd0e99695337b2df4433d4785cfa21593bd61b704d3aa78a9d8ce5183
Red Hat Security Advisory 2014-0212-01
Posted Feb 26, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0212-01 - Red Hat JBoss SOA Platform is the next-generation ESB and business process automation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage existing, modern, and future integration methodologies to dramatically improve business process execution speed and quality. This roll up patch serves as a cumulative upgrade for Red Hat JBoss SOA Platform 5.3.1. It includes various bug fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2013-2172, CVE-2013-4152
SHA-256 | 083d0305dc9b69b6fb620edee0c12f90b0c62b6152a1739f807e78fc9c42146c
Ubuntu Security Notice USN-2121-1
Posted Feb 26, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2121-1 - Suman Jana discovered that GnuTLS incorrectly handled version 1 intermediate certificates. This resulted in them being considered to be a valid CA certificate by default, which was contrary to documented behaviour.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2014-1959
SHA-256 | e31472c1008f49db136961e116376c9d6245bcd51804c58ec233ad40a1dc16b3
HP Security Bulletin HPSBMU02971
Posted Feb 26, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02971 - A potential security vulnerability has been identified in the Web Console component of HP Application Information Optimizer (formerly HP Database Archiving). The vulnerability could be exploited to allow remote execution of code and information disclosure. Revision 1 of this advisory.

tags | advisory, remote, web, info disclosure
advisories | CVE-2013-6203, CVE-2013-6204
SHA-256 | 7fa114f44e68956bc8ed3ff8e81ed51edc85fcef8252cb59af1e782d0de5c135
NIELD (Network Interface Events Logging Daemon) 0.5.0
Posted Feb 26, 2014
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.

Changes: This release adds a socket buffer size option.
tags | tool, kernel, system logging
systems | unix
SHA-256 | 5f6e1facff15ba1522757d0f05523382784dbb613ed3191964599d233372cec2
Apache Tomcat Information Disclosure Via XXE
Posted Feb 26, 2014
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 8.0.0-RC1 through 8.0.0-RC5, 7.0.0 through 7.0.47, and 6.0.0 through 6.0.37 suffer from an information disclosure vulnerability via XXE when running untrusted web applications.

tags | advisory, web, info disclosure, xxe
advisories | CVE-2013-4590
SHA-256 | e5038c902c4a597115e468b2cd9304969026597458d6fd3280891c6e2c2d59df
Red Hat Security Advisory 2014-0211-01
Posted Feb 26, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0211-01 - PostgreSQL is an advanced object-relational database management system. Multiple stack-based buffer overflow flaws were found in the date/time implementation of PostgreSQL. An authenticated database user could provide a specially crafted date/time value that, when processed, could cause PostgreSQL to crash or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in various type input functions in PostgreSQL. An authenticated database user could possibly use these flaws to crash PostgreSQL or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2014-0060, CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, CVE-2014-0066
SHA-256 | b42104045524c5b6c7136d8eb51782dbe945f7f2d689f9496c733b7271a311ba
WordPress Zedity 2.4.0 Cross Site Scripting
Posted Feb 26, 2014
Authored by HauntIT

WordPress Zedity plugin version 2.4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bf216e13309ba2da46c46dfe289f9ead0670f5dc9fc964553aa0349e0959017f
Private Camera Pro 5.0 File Inclusion / Command Injection / XSS
Posted Feb 26, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Private Camera Pro version 5.0 suffers from cross site scripting, command injection, and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 17fb206f13e33a50cc85ae1512cbabef9096f351f2e53a74039828fd6491558d
Apache Tomcat Denial Of Service
Posted Feb 26, 2014
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 8.0.0-RC1 through 8.0.0-RC5, 7.0.0 through 7.0.47, and 6.0.0 through 6.0.37 suffer from a denial of service vulnerability due to an incomplete fix for CVE-2012-3544.

tags | advisory, denial of service
advisories | CVE-2012-3544, CVE-2013-4322
SHA-256 | 8ac3ea938f07d2896bed13e92312af0a063d45b0633a23f122e4629acf2c3085
Joomla-Base XSS / XML Injection / Denial Of Service
Posted Feb 26, 2014
Authored by MustLive

Joomla-Base suffers from cross site scripting, XML injection, denial of service, and path disclosure vulnerabilities.

tags | exploit, denial of service, vulnerability, xss, info disclosure, xxe
SHA-256 | 9c3d160db634706c722994d1718973ddd740dd54ab93bb856a71efe8bd1ddd6d
Dilbert Cross Site Scripting
Posted Feb 26, 2014
Authored by s4r4d0

The Dilbert website suffers from a cross site scripting vulnerability. The author was unable to get a response from them and is releasing the details.

tags | exploit, xss
SHA-256 | 4725b63a3575c31c7ef77659a5bd8f137e8e475e3c68ed9fca8a7bd89a4b9646
Telegraph Cross Site Scripting
Posted Feb 26, 2014
Authored by s4r4d0

The Telegraph website suffers from a cross site scripting vulnerability. The author was unable to get a response from them and is releasing the details.

tags | exploit, xss
SHA-256 | c7c9dc4aba767147fa0567b50208e10db6efc702eac4f87f9312c857efc107f8
HP Security Bulletin HPSBST02937
Posted Feb 26, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBST02937 - A potential security vulnerability has been identified with HP StoreVirtual 4000 and StoreVirtual VSA Software (formerly known as HP LeftHand Virtual SAN Appliance) dbd_manager. The vulnerability could be remotely exploited resulting in execution of arbitrary code. Revision 1 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2013-4841
SHA-256 | a65650fb55a317acafa21e8f72f0a1f4fada511dee733a20476db56dbb334434
New York Times Cross Site Scripting
Posted Feb 26, 2014
Authored by s4r4d0

The New York Times website suffers from a cross site scripting vulnerability. The author was unable to get a response from them and is releasing the details.

tags | exploit, xss
SHA-256 | c95e989d546836b2092632c31447519ff2a90322f114cf8e1c1a72daaec85e8a
FeedWeb 2.4 Cross Site Scripting
Posted Feb 26, 2014
Authored by HauntIT

FeedWeb version 2.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a8ab6eec37820a53bb0fdd5de59e820583e5bbaff61956894396a5ba8a41b110
Page 2 of 2
Back12Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close