Cisco Security Advisory - Cisco IronPort AsyncOS Software for Cisco Email Security Appliance is affected by command injection and denial of service vulnerabilities. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
932804e2be92ceffb38ea7ef95554351baadb97daa74dff946b5066e74d61a87
Xaraya version 2.4.0-b1 suffers from multiple cross site scripting vulnerabilities.
ed1a6f3ff2988a17b6db15e8220f076ffe9b16698f9b2452201a32c958af6c74
Mandriva Linux Security Advisory 2013-179 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Abhishek Arya of the Google Chrome Security Team used the Address Sanitizer tool to discover a series of use-after-free problems rated critical as security issues in shipped software. Some of these issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting additional use-after-free and buffer overflow flaws in code introduced during Firefox development. These were fixed before general release. Various other security issues were also addressed. The mozilla firefox packages have been upgraded to the latest ESR version which is unaffected by these security flaws.
b0b72cafbc2361750e49e061e443bf4c31ccb39cd9f5d1f6c678247054a8cf27
Drupal Fast Permissions Administration third party module versions 6.x and 7.x suffer from an access bypass vulnerability.
11a82716b74d3388b64c64bd8529925dddcbabc2d3026fe8afbb8b4d42c34108
InstantCMS version 1.6 remote PHP code execution exploit that spawns a reverse shell.
58c5a918b42d3c4c9947890483bf68e4a4eea813701b686f794e5f548a9a717d
PCMan's FTP Server version 2.0 suffers from a directory traversal vulnerability.
befd414d7607ce444c68284006a6190f924ef4ab3b45babc6053af1f64729a1d
Motion version 3.2.12 suffers from buffer overflow, cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.
b0344ad160e1b46270a65b0478d5055eea41ebe9ede1d2cfbe6032d25f57175b
This Metasploit module abuses the zsudo binary, installed with zpanel, to escalate privileges. In order to work, a session with access to zsudo on the sudoers configuration is needed. This Metasploit module is useful for post exploitation of ZPanel vulnerabilities, where typically web server privileges are acquired, and this user is allowed to execute zsudo on the sudoers file.
52e9e7c654a610547771110083d88813bc9a4795b691c2e9a5c3e03710e35924
This Metasploit module exploits a flaw in the nicm.sys driver to execute arbitrary code in kernel space. The vulnerability occurs while handling ioctl requests with code 0x143B6B, where a user provided pointer is used as function pointer. The module has been tested successfully on Windows 7 SP1 with Novell Client 2 SP3.
29e2599fa19955b4e378cc384fac89d22004319b161281a41dcdcb36beb3e0b5
This exploit leverages an eval() bug in the PHP Charts library allowing for remote code execution. A reverse shell is delivered using Perl.
029603a16bd1c86cec4981c7cc5216c1aedd6bad4d2e981fafffc02c8f122825
This Metasploit module exploits a vulnerability that can be used to modify portions of a process's address space, which may lead to privilege escalation. Systems such as FreeBSD 9.0 and 9.1 are known to be vulnerable.
9d8c78182da26e1da3cf3977d1da297ce969b5376665d620df728cbdcad3f431
Exploit for the PHP-CGI argument injection vulnerability disclosed in 2012. Has file uploading, inline shell spawning, and both python and perl reverse shell implementations using an earlier version of the "payload" library written for such exploits.
e1af41b9b973cb570db69238e6f14f4459e72926e687318f078562f00ce29e0f
LotusCMS version 3.0 remote PHP code execution exploit as disclosed in 2011. It spawns a reverse shell.
56acf18780a5602a4ab5e831ef3c7a6cfef83560842950e615cae1fc4847bc4b
Debian Linux Security Advisory 2714-1 - Konstantin Belousov and Alan Cox discovered that insufficient permission checks in the memory management of the FreeBSD kernel could lead to privilege escalation.
26e535e94e7f71003a1fffd0d098d7f8d670f7c87a3b3313885b7e81b305b395
WHMCS appears to suffer from a cross site request forgery vulnerability.
b5796b396efd0618d69da2887baf2e280c72e6f06191cd17881fdc38654ec207
This is a reverse shell over SCTP implemented in Python. Currently it does not use SSL, but may evade most firewalls and IDS devices as many of them seemingly have no rules in place to check SCTP traffic.
6743f69ce173275310d5f2ffe1d1a49e6786c7abd202da271f4e6f25bd156590