exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2014-02-15

Symantec PGP Universal Web Messenger Unauthorized Access
Posted Feb 15, 2014
Authored by Richard O'Donnell | Site portcullis-security.com

Symantec PGP Universal Web Messenger versions prior to 3.3.2 suffer from an unauthorized access vulnerability.

tags | exploit, web, info disclosure
advisories | CVE-2014-1643
SHA-256 | 3232c190e9c3b61290c9500712c00ed512bdaaceabaa23ecf04aebb226a5dba7
Dexter (CasinoLoader) SQL Injection
Posted Feb 15, 2014
Authored by bwall | Site metasploit.com

This Metasploit module exploits a vulnerability found in the command and control panel used to control Dexter (Point of Sale malware). This is done by accessing the PHP page used by bots to report in (gateway.php) which does not sanitize input. Input is encrypted and encoded, but the key is supplied by the bot connecting. The 'page' parameter is used in this case. The command and control panel designates a location to upload files, and can be used as a reliable location to write a PHP shell. Authentication is not needed to exploit this vulnerability.

tags | exploit, shell, php
SHA-256 | dce8241e9805e316fba94ae258cb1d530cdf76424afa2b06b216ab421407282c
Mandriva Linux Security Advisory 2014-033
Posted Feb 15, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-033 - Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service via a long server name in the PROXY-CONNECT address in the command line. The updated packages have been upgraded to the 1.7.2.3 version which is not vulnerable to this issue.

tags | advisory, denial of service, overflow, local
systems | linux, mandriva
advisories | CVE-2014-0019
SHA-256 | abec99f3883ab46d466abbf1b96c480fe50c1baae17797d35de82ec45234cac2
Mandriva Linux Security Advisory 2014-032
Posted Feb 15, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-032 - The play_wave_from_socket function in audio/auserver.c in Flite 1.4 allows local users to modify arbitrary files via a symlink attack on /tmp/awb.wav. NOTE: some of these details are obtained from third party information. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2014-0027
SHA-256 | 92c35daa3ec0ffbce591b7131aece7d46e2073390c92cfedbba31c1c8da90fc0
Mandriva Linux Security Advisory 2014-031
Posted Feb 15, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-031 - The OpenID module in Drupal 6.x before 6.30 and 7.x before 7.26 allows remote OpenID users to authenticate as other users via unspecified vectors. The Taxonomy module in Drupal 7.x before 7.26, when upgraded from an earlier version of Drupal, does not properly restrict access to unpublished content, which allows remote authenticated users to obtain sensitive information via a listing page. The updated packages has been upgraded to the 7.26 version which is unaffected by these security flaws.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2014-1475, CVE-2014-1476
SHA-256 | 38a8b456f1ddaea726c4ddda8c19d3cab055f6fca0243709c53c847616e62e95
Slackware Security Advisory - curl Updates
Posted Feb 15, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New curl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-0015
SHA-256 | 66cd1f4230fb7484ba0853348fbedf4f8fe9847826856451abeb3caf0e4ad540
Slackware Security Advisory - ntp Updates
Posted Feb 15, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2013-5211
SHA-256 | f24dc5740ec0db7df6d2b7fa0393c41089456451df322b6e8e82a908e5b509dc
Mandriva Linux Security Advisory 2014-034
Posted Feb 15, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-034 - The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow. The updated packages have been upgraded to the 0.1.5 version which is not vulnerable to this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2013-6393
SHA-256 | 11f41866c9ac0e18931739209b438667e222d055fc525a8992a226392b7e772b
TomatoCart 1.1.8.6 Local File Inclusion
Posted Feb 15, 2014
Authored by TUNISIAN CYBER

TomatoCart version 1.1.8.6 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 0db04e2aa39556df8a1625587d835afcc627d919a44f82e78ca794ed5802b291
WordPress Better WP Security 3.6.3 XSS / Disclosure
Posted Feb 15, 2014
Authored by Yashar shahinzadeh

WordPress Better WP Security plugin version 3.6.3 suffers from information disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | bafa2024f4c45430b34ad1a7bf7281c235b2ac9d77bc18d543a0ac4ec5aa3b0e
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close