exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2017-10-12

PHP Melody 2.7.3 Cross Site Scripting / SQL Injection
Posted Oct 12, 2017
Authored by Paulos Yibelo

PHP Melody version 2.7.3 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, php, vulnerability, xss, sql injection
SHA-256 | 5614049b822636ce667292c3cab2231cc4225e1397f912386bf5a79eb8d44faa
Red Hat Security Advisory 2017-2889-01
Posted Oct 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2889-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.4.6 serves as a replacement for Red Hat JBoss BPM Suite 6.4.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Multiple security issues have been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2017-5645, CVE-2017-7957
SHA-256 | c7939695f10427358e0414e6351cb34199efeae8c63812b03e4d3398c8445f7e
Red Hat Security Advisory 2017-2888-01
Posted Oct 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2888-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.4.6 serves as a replacement for Red Hat JBoss BRMS 6.4.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.

tags | advisory, remote, arbitrary, udp, tcp
systems | linux, redhat
advisories | CVE-2017-5645, CVE-2017-7957
SHA-256 | 3868ecc1e90ce4272d7616c38753626b0c309d2d00f48fc2957ac96090c42f3b
Ubuntu Security Notice USN-3454-1
Posted Oct 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3454-1 - It was discovered that libffi incorrectly enforced an executable stack. An attacker could possibly use this issue, in combination with another vulnerability, to facilitate executing arbitrary code.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-1000376
SHA-256 | 9c72c1d14fa10516f5f75ad3bfcbe7d7d72f85da27d6cda0bc94aadd14534cd2
Falco 0.8.1
Posted Oct 12, 2017
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Fixed packaging to specify correct built-in config file.
tags | tool, intrusion detection
systems | unix
SHA-256 | f747e8dcba7451f90dec6101ab3f0ef45b4ae95d9a97e00e8302ce9b7d95542a
Windows Escalate UAC Protection Bypass (In Memory Injection) Abusing WinSXS
Posted Oct 12, 2017
Authored by Ernesto Fernandez | Site metasploit.com

This Metasploit module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off by abusing the way "WinSxS" works in Windows systems. This Metasploit module uses the Reflective DLL Injection technique to drop only the DLL payload binary instead of three separate binaries in the standard technique. However, it requires the correct architecture to be selected, (use x64 for SYSWOW64 systems also).

tags | exploit, shell
systems | windows
SHA-256 | 8cd31ba17bb756dff503d85ed7cfa7ac81b9cff23d1bb0cb3ec38c54ca1c4696
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
Posted Oct 12, 2017
Authored by mr_me, Mehmet Ince | Site metasploit.com

This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. Trend Micro IMSVA product have widget feature which is implemented with PHP. Insecurely configured web server exposes diagnostic.log file, which leads to an extraction of JSESSIONID value from administrator session. Proxy.php files under the mod TMCSS folder takes multiple parameter but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.

tags | exploit, web, php, tcp, vulnerability
SHA-256 | a28a0e405c43d1d9d228e28261a5e904e2adcd99280b5dee750ba1116cc84e02
Tomcat JSP Upload Bypass Remote Code Execution
Posted Oct 12, 2017
Authored by peewpw | Site metasploit.com

This Metasploit module uploads a jsp payload and executes it.

tags | exploit
advisories | CVE-2017-12617
SHA-256 | 1bcd8522a629c51e6deae61cfca749f33b5097c339c0e8c1ae355f14834964cb
Ubuntu Security Notice USN-3453-1
Posted Oct 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3453-1 - Michal Srb discovered that the X.Org X server incorrectly handled shared memory segments. An attacker able to connect to an X server, either locally or remotely, could use this issue to crash the server, or possibly replace shared memory segments of other X clients in the same session. Michal Srb discovered that the X.Org X server incorrectly handled XKB buffers. An attacker able to connect to an X server, either locally or remotely, could use this issue to crash the server, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-13721, CVE-2017-13723
SHA-256 | b2bc0f9775721eb3fa681f9707487f1f1193a79c9e6a1a262256218faff14edb
X-Cart 5.2.23 / 5.3.1.9 / 5.3.2.13 / 5.3.3 PHP Code Injection
Posted Oct 12, 2017
Authored by sxcurity

X-Cart versions 5.2.23, 5.3.1.9, 5.3.2.13, and 5.3.3 suffer from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | 5c6af3d1ed388db21242b82fbc516a582dabb01c58afe85edbd84bcdf72fe0b7
OctoberCMS 1.0.425 Cross Site Scripting
Posted Oct 12, 2017
Authored by Ishaq Mohammed

OctoberCMS version 1.0.425 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-15284
SHA-256 | 3df000b7a5627cbc2f13686698775fb84026d7281fc3bd4fb07cb5597369b8c1
WordPress PopCash.Net Publisher Code Integration 1.0 Cross Site Scripting
Posted Oct 12, 2017
Authored by Ricardo Sanchez

WordPress PopCash.Net Publisher Code Integration plugin version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc43e6bb6418aa92b18d68bca69df3a6e940982b9f72175c36b19b217ea91135
WordPress Pootle Button 1.1.1 Cross Site Scripting
Posted Oct 12, 2017
Authored by Ricardo Sanchez

WordPress Pootie Button plugin version 1.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 24a76bc6d718c2e56014b480a5dd48a2f4457b3c5a0a2bd4c5ad481bae6cdcab
Red Hat Security Advisory 2017-2886-01
Posted Oct 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2886-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: rh-mysql57-mysql. Security Fix: An integer overflow flaw leading to a buffer overflow was found in the way MySQL parsed connection handshake packets. An unauthenticated remote attacker with access to the MySQL port could use this flaw to crash the mysqld daemon.

tags | advisory, remote, overflow
systems | linux, redhat
advisories | CVE-2016-5483, CVE-2016-8327, CVE-2017-3238, CVE-2017-3244, CVE-2017-3251, CVE-2017-3256, CVE-2017-3257, CVE-2017-3258, CVE-2017-3273, CVE-2017-3291, CVE-2017-3308, CVE-2017-3309, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3319, CVE-2017-3320, CVE-2017-3331, CVE-2017-3450, CVE-2017-3453, CVE-2017-3454, CVE-2017-3455, CVE-2017-3456, CVE-2017-3457, CVE-2017-3458, CVE-2017-3459, CVE-2017-3460
SHA-256 | ab4e92004548788c79614f7c05b6d2c3c3448effbadd3ccabd3acbab1019e604
Red Hat Security Advisory 2017-2885-01
Posted Oct 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2885-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.4.0. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2017-7793, CVE-2017-7810, CVE-2017-7814, CVE-2017-7818, CVE-2017-7819, CVE-2017-7823, CVE-2017-7824
SHA-256 | 5f20f5f2c4f99fbad3690c5cf29d0ddabb96dc263218b04ecf736509078ebd75
Red Hat Security Advisory 2017-2882-01
Posted Oct 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2882-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2017-9798
SHA-256 | b294ae7843b44eeda61772103e1aa5e29e1103d47f3fd1e06ae69f27761915de
Ubuntu Security Notice USN-3452-1
Posted Oct 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3452-1 - It was discovered that Ceph incorrectly handled the handle_command function. A remote authenticated user could use this issue to cause Ceph to crash, resulting in a denial of service. Rahul Aggarwal discovered that Ceph incorrectly handled the authenticated-read ACL. A remote attacker could possibly use this issue to list bucket contents via a URL. Diluga Salome discovered that Ceph incorrectly handled certain POST objects with null conditions. A remote attacker could possibly use this issue to cuase Ceph to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-5009, CVE-2016-7031, CVE-2016-8626, CVE-2016-9579
SHA-256 | d0c4dbab4d999caaccd4e408ea4c5e060bec46f1b4a9923abaf76b2c18d3879d
Ubuntu Security Notice USN-3451-1
Posted Oct 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3451-1 - It was discovered that OpenStack Swift incorrectly handled tempurls. A remote authenticated user in possession of a tempurl key authorized for PUT could retrieve other objects in the same Swift account. Romain Le Disez and Arjan Persson discovered that OpenStack Swift incorrectly closed client connections. A remote attacker could possibly use this issue to consume resources, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-5223, CVE-2016-0737, CVE-2016-0738
SHA-256 | 70e90fd9f9d13513b72ce23eb9a5afc5589f7b785f6e14f8d84470b767224214
Ubuntu Security Notice USN-3450-1
Posted Oct 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3450-1 - Bhargava Shastry discovered that Open vSwitch incorrectly handled certain OFP messages. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. It was discovered that Open vSwitch incorrectly handled certain OpenFlow role messages. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. It was discovered that Open vSwitch incorrectly handled certain malformed packets. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. This issue only affected Ubuntu 17.04. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2017-9214, CVE-2017-9263, CVE-2017-9264, CVE-2017-9265
SHA-256 | 7451dfdaef4bf81cb411c0d38bdcc733cd605995d8a39176c7e352bf54a51ee0
Sync Breeze Enterprise 10.1.16 SEH Overflow
Posted Oct 12, 2017
Authored by wetw0rk

Sync Breeze Enterprise version 10.1.16 GET request SEH overflow exploit.

tags | exploit, overflow
SHA-256 | ec771f88550b94bbe9cfabcdcf4db2ad8e3d37f026bd35777f5551bc63ec5a8e
VX Search Enterprise 10.1.12 Buffer Overflow
Posted Oct 12, 2017
Authored by Revnic Vasile

VX Search Enterprise version 10.1.12 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-15220
SHA-256 | d714a624da49d1d906deb28458ae1d8c8d99fd4de2c5a27596421255c59f38ba
ASX To MP3 3.1.3.7 Buffer Overflow
Posted Oct 12, 2017
Authored by Parichay Rai

ASX to MP3 version 3.1.3.7 .m3u buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2017-15221
SHA-256 | 13bc3edf4476c4419e1830011e4cdc53a1186994835ec9c4058070a351f28ea7
binutils 2.29.51.20170921 read_1_byte Heap-Based Buffer Overflow
Posted Oct 12, 2017
Authored by Agostino Sarubbo

binutils version 2.29.51.20170921 suffers from a read_1_byte heap-based buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-14939
SHA-256 | 726058e1fb4acb175d2d189367a385fbff745ff2cf8453569cb233dbfb4897eb
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close