em

Nagios XI Authenticated Remote Command Execution

This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI.










em

Mandos Encrypted File System Unattended Reboot Utility 1.8.11

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.





em

Samsung Android Remote Code Execution

Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia.










em

HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary.




em

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.








em

systemx.txt

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.




em

Linux's systemd Vulnerable To DNS Server Attack




em

Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation

A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected.




em

User Management System 2.0 SQL Injection

User Management System version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.




em

Complaint Management System 4.2 SQL Injection

Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass.




em

Online Shopping System Advanced 1.0 SQL Injection

Online Shopping System Advanced version 1.0 suffers from a remote SQL injection vulnerability.




em

Fishing Reservation System SQL Injection

Fishing Reservation System suffers from multiple remote SQL injection vulnerabilities.




em

Online Scheduling System 1.0 SQL Injection

Online Scheduling System version 1.0 suffers from a remote SQL injection vulnerability.




em

Pisay Online E-Learning System 1.0 SQL Injection / Code Execution

Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities.




em

Online AgroCulture Farm Management System 1.0 SQL Injection

Online AgroCulture Farm Management System version 1.0 suffers from a remote SQL injection vulnerability.




em

School File Management System 1.0 SQL Injection

School File Management System version 1.0 suffers from a remote SQL injection vulnerability.




em

Car Park Management System 1.0 SQL Injection

Car Park Management System version 1.0 suffers a remote SQL injection vulnerability that allows for authentication bypass.




em

Ecommerce Systempay 1.0 Brute Force

Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability.






em

X.org Bug Bites OpenBSD And Other Big Operating Systems









em

Transferable Remote 1.1 XSS / LFI / Command Injection

Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities.




em

Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free

Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing.