what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2013-06-19

FreeBSD 9.0 / 9.1 mmap/ptrace Exploit
Posted Jun 19, 2013
Authored by Hunger

FreeBSD versions 9.0 and 9.1 mmap/ptrace privilege escalation exploit that leverages the issue described in FreeBSD-SA-13:06.

tags | exploit
systems | freebsd
advisories | CVE-2013-2171
SHA-256 | 33ab3cd2db81ca119a894609c3cbec29fc118789f6df44a99945d5cda231b71c
Drupal Login Security 6.x / 7.x DoS / Bypass
Posted Jun 19, 2013
Authored by Heine Deelstra, David Stoline | Site drupal.org

Drupal Login Security third party module versions 6.x and 7.x suffer from bypass and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
SHA-256 | 598061f54bac357e4a742401275a6a32cd65fb79938c18d3b4947c9e8cce8cc3
GLPI 0.83.7 Parameter Traversal Arbitrary File Access
Posted Jun 19, 2013
Authored by Humberto Cabrera | Site zeroscience.mk

GLPI version 0.83.7 suffers from a parameter traversal vulnerability that allows for arbitrary file access.

tags | exploit, arbitrary
SHA-256 | 8c549c03c6d7b7e06618844943413d35622dfba90639b3c6ac5e75b5a16e3a25
IBM WebSphere Commerce Padding Oracle Attacks
Posted Jun 19, 2013
Authored by George D. Gal, Timothy D. Morgan | Site vsecurity.com

In February 2013, VSR identified a vulnerability in the IBM WebSphere Commerce framework which could allow an attacker to tamper with values stored in the "krypto" URL parameter. This parameter is encrypted with a block cipher without any independent integrity protection. This, combined with observed application behavior, allows for padding oracle attacks which can be used to decrypt the krypto token and forge new tokens with arbitrary embedded parameters.

tags | advisory, arbitrary
advisories | CVE-2013-0523
SHA-256 | 5998d6a975a57dc3921286cababdc5aa780a65141183d9726f3d8938c1392707
RSA BSAFE SSL-J BEAST / Lucky Thirteen
Posted Jun 19, 2013
Site emc.com

RSA BSAFE SSL-J 6.0.1 and 5.1.2 contain updates designed to prevent BEAST attacks and SSL/TLS Plaintext Recovery (aka Lucky Thirteen) attacks.

tags | advisory
advisories | CVE-2013-0169, CVE-2011-3389
SHA-256 | c4c500343555b143f39e0055e4ce990a4e2809cae8e525b10d41140c0a9e374e
FreeBSD mmap Privilege Escalation
Posted Jun 19, 2013
Authored by _hugsy_

This exploits performs privilege escalation leveraging the mmap vulnerability in FreeBSD 9.1 as described in FreeBSD-SA-13:06.

tags | exploit
systems | freebsd
advisories | CVE-2013-2171
SHA-256 | f4335d5441b706cb24ce9fb6b71366091edddbb0838d83d2cd1b69a4edab8fdf
TP-Link Print Server TL PS110U Information Enumeration
Posted Jun 19, 2013
Authored by SANTHO

TP-Link Print Server version TL PS110U suffers from a sensitive information enumeration vulnerability.

tags | exploit
SHA-256 | d9a49fe63d706d493bab0eca559b24f7343fd3b17429368055b9144c891c110d
RSA BSAFE SSL/TLS Plaintext Recovery
Posted Jun 19, 2013
Site emc.com

Researchers have discovered a weakness in the handling of CBC cipher suites in SSL, TLS and DTLS for RSA BSAFE Micro Edition Suite for all versions outside of 4.0.3 and 3.2.5. The Lucky Thirteen attack exploits timing differences arising during MAC processing. Vulnerable implementations do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

tags | advisory, remote
advisories | CVE-2013-0169
SHA-256 | 63d67971616d756f9a24527aece917f871801037a08e76de35be02323baa702a
Technical Cyber Security Alert 2013-169A
Posted Jun 19, 2013
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2013-169A - Oracle released the June 2013 Critical Patch Update for Oracle Java SE. This patch contains 40 new security fixes across Java SE products and a fix to the Javadoc Tool. API documentation in HTML format generated by the Javadoc tool that contains a right frame may be vulnerable to frame injection when hosted on a web server.

tags | advisory, java, web
SHA-256 | a41aca8835ee3499199ea44a2b84c6181c92e3efce36d2da65f6daf2fd76c218
Mod_Security Cross Site Scripting Bypass
Posted Jun 19, 2013
Authored by Rafay Baloch

Mod_security suffered from a cross site scripting filter bypass vulnerability.

tags | exploit, xss, bypass
SHA-256 | f2125bb4ab7692426d1789ea62aa804f599421f07fed6bc8474c3e45d715a2d3
Source Code Analysis With Web Applications II
Posted Jun 19, 2013
Authored by Mehmet Ince

This is a whitepaper discussing source code analysis of web applications. Part II. Written in Turkish.

tags | paper, web
SHA-256 | fe510373b10e5474bdc1acc5c1761320d2fb4d867dc1d9246c37e78241a778a4
MusicBee 2.0.4663 Denial Of Service
Posted Jun 19, 2013
Authored by Chako

MusicBee version 2.0.4663 .m3u denial of service exploit.

tags | exploit, denial of service
SHA-256 | 4b7be457ec441bb7f68bfa2e92c08eabed3ef82cfe231887d1c6a031dddcce12
Facebook Permanent Photo URIs
Posted Jun 19, 2013
Authored by Joel Shoe

Facebook appears to suffer from a critical design flaw in how users share photos using a URI. Once a URI is known the only action the user can take to hide the contents of a photo album is to delete the album. This means if you ever have a breach, be it someone sitting in front of your computer, or getting your Facebook password, you must delete all your photo albums to keep the contents private.

tags | advisory, info disclosure
SHA-256 | 0a29cfeb80463cd152ef5b3f1d86ba9355c1a6664476d861f177f8a3a82b52fa
Joomla Rokdownloads Shell Upload
Posted Jun 19, 2013
Authored by Am!r | Site irist.ir

The Joomla Rokdownloads component suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 43432f4a6d7fc1d83fb420edcacc1d415db5a0e041a2beb071e8e89ee41a1f10
Debian Security Advisory 2628-2
Posted Jun 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2628-2 - The security update DSA-2628 for nss-pam-ldapd failed to build on kfreebsd-amd64 and kfreebsd-i386.

tags | advisory
systems | linux, debian
advisories | CVE-2013-0288
SHA-256 | ca04431f7098338d92f01c30b2b14d94f107aed5b83c0e5d0a566ae308c1550a
MoinMoin twikidraw Action Traversal File Upload
Posted Jun 19, 2013
Authored by juan vazquez, temp66, HTP | Site metasploit.com

This Metasploit module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi configurations by overwriting moin.wsgi, which allows to execute arbitrary python code, as exploited in the wild on July, 2012.

tags | exploit, arbitrary, python
advisories | CVE-2012-6081, OSVDB-88825
SHA-256 | 357506b05f75972b93ef4f53d7935e38c58ae9d6c3dc89990bc79b7b56e9d911
Debian Security Advisory 2698-1
Posted Jun 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2698-1 - Multiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion.

tags | advisory
systems | linux, debian
advisories | CVE-2013-1960, CVE-2013-1961
SHA-256 | 2d2368ecc0f7d48d6b7d6ddde98b2ad8db9e4da5cfa9209da669bc81c6a219db
Ubuntu Security Notice USN-1886-1
Posted Jun 19, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1886-1 - It was discovered that Puppet incorrectly handled YAML payloads. An attacker on an untrusted client could use this issue to execute arbitrary code on the master.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-3567
SHA-256 | eb685b156838671fe79b419fa87ca1d86032de2006cbe1d74ccf0cf26603bd9e
Solaris 10 Patch Cluster File Clobber
Posted Jun 19, 2013
Authored by Larry W. Cashdollar

Solaris 10 patch cluster suffers from a file clobber vulnerability in /tmp.

tags | exploit
systems | solaris
SHA-256 | 03794219b3e100fca16c556ac9f4ccfaad291a40205e4a5a016b11eca6895b3e
Puppet Remote Code Execution
Posted Jun 19, 2013
Authored by Ben Murphy

When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the deserialization to construct an instance of any class available in the ruby process, which allows an attacker to execute code contained in the payload.

tags | advisory, ruby
advisories | CVE-2013-3567
SHA-256 | 4331f8a7741c008aa390b37694c2381491f1dd083ba0a9941ebaf7a62f36e8ac
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close