This Metasploit module exploits a buffer overflow vulnerability found in HP's StorageWorks P4000 VSA on versions prior to 10.0. The vulnerability is due to an insecure usage of the sscanf() function when parsing login requests. This Metasploit module has been tested successfully on the HP VSA 9 Virtual Appliance.
c810c80e4fc09b6a9392a10756eb6cd6120f71ac14b60f6318728483ac84327b
This Metasploit module exploits multiple vulnerabilities found in Open&Compact FTP server. The software contains an authentication bypass vulnerability and a arbitrary file upload vulnerability that allows a remote attacker to write arbitrary files to the file system as long as there is at least one user who has permission. Code execution can be achieved by first uploading the payload to the remote machine as an exe file, and then upload another mof file, which enables WMI (Management Instrumentation service) to execute the uploaded payload. Please note that this module currently only works for Windows before Vista.
1c6829f3aa5790761fb910b2f802e2c160f810883ffc902bf2614ece3bbacfae
WATOBO, the Web Application Toolbox, is a tool that enables security professionals to perform highly efficient (semi-automated) web application security audits. It acts like a local proxy and analyzes the traffic on the fly for helpful information and vulnerabilities. It also has automated scanning capabilities, e.g. SQL injection, cross site scripting and more.
ecc5cef05aa502575841bd3e15d42e0dc6e464feff4a873f60fa69774446b024
The IBM Advanced Management module suffers from a cross site scripting vulnerability.
5ab611a253a002c9df7f06dd2376c7652772ce0ea5af2e27482bcd1b097504f7
Debian Linux Security Advisory 2737-1 - Several vulnerabilities have been discovered in Swift, the Openstack object storage.
919524417f732e6607d2bbf583b49fa6d0f577aaccfbc8eb587d12e9c0f29639
Red Hat Security Advisory 2013-1151-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. A flaw was discovered in the way authenticated connections were cached on the server by remote-naming. After a user has successfully logged in, a remote attacker could use a remoting client to log in as that user without knowing their password, allowing them to access data and perform actions with the privileges of that user. A flaw was discovered in the way connections for remote EJB invocations via the EJB client API were cached on the server. After a user has successfully logged in, a remote attacker could use an EJB client to log in as that user without knowing their password, allowing them to access data and perform actions with the privileges of that user.
5e6d958816f76a7dc58ecb35d6843de010eada38c87140b78c803ed75e597feb
Red Hat Security Advisory 2013-1152-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. A flaw was discovered in the way authenticated connections were cached on the server by remote-naming. After a user has successfully logged in, a remote attacker could use a remoting client to log in as that user without knowing their password, allowing them to access data and perform actions with the privileges of that user. A flaw was discovered in the way connections for remote EJB invocations via the EJB client API were cached on the server. After a user has successfully logged in, a remote attacker could use an EJB client to log in as that user without knowing their password, allowing them to access data and perform actions with the privileges of that user.
3129717156814de23bcb00f945fb1a5cf0db456762e86140e961bb07bf3ce419
Mandriva Linux Security Advisory 2013-211 - It was discovered that Little CMS did not properly verify certain memory allocations. If a user or automated system using Little CMS were tricked into opening a specially crafted file, an attacker could cause Little CMS to crash.
688dff96b4b4e229239cd91d4d689b8039be5f55537ba6344a4905ec3b2f7fa2
Debian Linux Security Advisory 2736-1 - Several vulnerabilities where discovered in PuTTY, a Telnet/SSH client for X.
ea09b6ba2cb0bdb082e50ab33851abed8f3f23e0762016e7993144257b9c0498
Sami FTP server version 2.0.1 MKD buffer overflow exploit with ASLR bypass.
ff9131394ac1e94674f687d783811a31ed116f377901defe7b7fde3fc1fcd459
This paper describes the PE (Portable Executable) file format used by Windows executables (.exe), dynamic link libraries (.dll) and other files: system drivers or ActiveX controls. It is written in Romanian.
a2646c777b4db6e736b6d280dbe7880941e981053a622f50cc9a96c813f0425e
Indrajith FTP cracker is a dictionary-based FTP username and password cracker. Source included.
8aea2aa3fcf09b993a9622b1814fc1f7e90da1343f5e12ee6387d0eac291be80
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program.
08adb1b876765479572292aa1527fb22f2fcaf677de1dde38930f0ef325407cb
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
4bf1140afc7eb451ce1428add296d72b7d28232fc859db141fba065ebfc18d26