x

Gentoo Linux Security Advisory 202003-06

Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected.




x

Gentoo Linux Security Advisory 202003-09

Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected.




x

Xcon2005_San.pdf

Xcon 2005: Hacking Windows CE




x

SYMSA-2007-012.txt

Symantec Vulnerability Research SYMSA-2007-012 - Microsoft Windows CE suffers from a IGMP related denial of service vulnerability.




x

Windows Mobile 6.5 MessageBox Shellcode

Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM.




x

Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow

This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista.




x

Windows Vista/7 lpksetup.exe DLL Hijacking

Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe.




x

Windows Vista/7 UAC Bypass Exploit

Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass.




x

Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service

Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.




x

DVD X Player 5.5 .plf PlayList Buffer Overflow

This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7.




x

Mandriva Linux Security Advisory 2012-081

Mandriva Linux Security Advisory 2012-081 - Security issues were identified and fixed in mozilla firefox. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. Various other issues have also been addressed.




x

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




x

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




x

NTR ActiveX Control Check() Method Buffer Overflow

This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.




x

HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary.




x

SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write

This Metasploit module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This Metasploit module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN).




x

MS14-060 Microsoft Windows OLE Package Manager Code Execution

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable.




x

MS14-064 Microsoft Windows OLE Package Manager Code Execution

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function.




x

MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function.




x

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.








x

Solaris 11.4 xscreensaver Privilege Escalation

Solaris version 11.4 xscreensaver local privilege escalation exploit.




x

Solaris xscreensaver Privilege Escalation

This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86).




x

Solaris xlock Information Disclosure

A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely.




x

Oracle Solaris 11.x / 10 whodo / w Buffer Overflow

A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges.




x

NetBSD-SA1999-012.vax.ptrace

NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here.




x

systemx.txt

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.




x

vaxhack.zip

How to hack VAX's.




x

vaxdeco.zip

A VAX decoy script to grab some accunts.




x

cccvax.zip

Pretty complete file on hacking VAX/VMS machines




x

psibrute.com.txt

This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.




x

SSRT4866.txt

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain unauthorized privileged access to data and system resources.




x

Linux's systemd Vulnerable To DNS Server Attack




x

Hacker's Hijack Security Firm Fox-IT's Domain






x

Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting

Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability.




x

Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests

Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall.




x

Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing

Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability.




x

Gentoo Linux Security Advisory 202004-06

Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected.




x

Rootstealer X11 Code Executor

Rootstealer is a program to detect when a linux user opens a terminal with root and it injects intrusive commands in the terminal with X11.




x

Pisay Online E-Learning System 1.0 SQL Injection / Code Execution

Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities.




x

XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer

XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script.




x

XOR File Encryption / Decryption

Script to perform basic XOR file encryption / decryption.