isc

Packet Storm Advisory 2013-0621 - Facebook Information Disclosure

Facebook suffered from an information disclosure vulnerability. If a user uploaded their contacts to Facebook and then proceeded to download their expanded dataset from the DYI (Download Your Information) section, they would receive a file called addressbook.html in their downloaded archive. The addressbook.html is supposed to house the contact information they uploaded. However, due to a flaw in how Facebook implemented this, it also housed contact information from other uploads other users have performed for the same person, provided they had one piece of matching data. This effectively built large dossiers on users and disclosed their information to anyone that knew at least one piece of matching data.




isc

Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




isc

Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.




isc

Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries).




isc

Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors).




isc

Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values.




isc

Realtek SDK Information Disclosure / Code Execution

Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities.




isc

Centreon 19.10.5 Credential Disclosure

Centreon version 19.10.5 suffers from a database credential disclosure vulnerability.




isc

Jira 8.3.4 Information Disclosure

Jira version 8.3.4 suffers from a username enumeration information disclosure vulnerability.




isc

Verodin Director Web Console 3.5.4.0 Password Disclosure

Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit.




isc

LabVantage 8.3 Information Disclosure

LabVantage version 8.3 suffers from an information disclosure vulnerability.




isc

SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution

SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities.




isc

ManageEngine EventLog Analyzer 10.0 Information Disclosure

ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability.




isc

Citrix Gateway 11.1 / 12.0 / 12.1 Information Disclosure

Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from an information disclosure vulnerability.




isc

HP ThinPro 6.x / 7.x Information Disclosure

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability.




isc

MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution

MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities.




isc

Swift File Transfer Mobile Cross Site Scripting / Information Disclosure

The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities.




isc

Edimax EW-7438RPn Information Disclosure

Edimax EW-7438RPn suffers from an information disclosure vulnerability.




isc

File Explorer 1.4 Information Disclosure

File Explorer version 1.4 for iOS suffers from an information disclosure vulnerability.




isc

webERP 4.15.1 Backup Disclosure

webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability.




isc

Cisco UCS Director Unauthenticated Remote Code Execution

The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products.




isc

Cisco M1070 Content Security Management Appliance IronPort Header Injection

Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit.




isc

Cisco C170 Email Security Appliance 10.0.3-003 IronPort Header Injection

Cisco C170 Email Security Appliance version 10.0.3-003 IronPort remote host header injection exploit.




isc

Cisco Email Security Virtual Appliance C100V IronPort Header Injection

Cisco Email Security Virtual Appliance C100V IronPort remote host header injection exploit.




isc

Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection

Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit.




isc

Cisco Email Security Virtual Appliance C600V IronPort Header Injection

Cisco Email Security Virtual Appliance C600V IronPort remote host header injection exploit.




isc

Cisco Email Security Virtual Appliance C370 IronPort Header Injection

Cisco Email Security Virtual Appliance C370 IronPort remote host header injection exploit.




isc

Cisco IronPort C350 Header Injection

Cisco IronPort C350 remote host header injection exploit.




isc

Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection

Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit.




isc

Cisco Email Security Virtual Appliance C300V IronPort Header Injection

Cisco Email Security Virtual Appliance C300V IronPort remote host header injection exploit.




isc

Cisco Email Security Virtual Appliance C380 IronPort Header Injection

Cisco Email Security Virtual Appliance C380 IronPort remote host header injection exploit.




isc

Cisco Device Hardcoded Credentials / GNU glibc / BusyBox

Many Cisco devices such as Cisco RV340, Cisco RV340W, Cisco RV345, Cisco RV345P, Cisco RV260, Cisco RV260P, Cisco RV260W, Cisco 160, and Cisco 160W suffer from having hard-coded credentials, known GNU glibc, known BusyBox, and IoT Inspector identified vulnerabilities.




isc

Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification

Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit.




isc

Cisco WLC 2504 8.9 Denial Of Service

Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability.




isc

Cisco DCNM JBoss 10.4 Credential Leakage

Cisco DCNM JBoss version 10.4 suffers from a credential leakage vulnerability.




isc

Cisco Discovery Protocol (CDP) Remote Device Takeover

Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices.




isc

Cisco Data Center Network Manager 11.2 Remote Code Execution

Cisco Data Center Network Manager version 11.2 remote code execution exploit.




isc

Cisco Data Center Network Manager 11.2.1 SQL Injection

Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability.




isc

Cisco Data Center Network Manager 11.2.1 Command Injection

Cisco Data Center Network Manager version 11.2.1 remote command injection exploit.




isc

Cisco Unified Contact Center Express Privilege Escalation

Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.




isc

Cisco IP Phone 11.7 Denial Of Service

Cisco IP Phone version 11.7 denial of service proof of concept exploit.




isc

Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation

Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names.




isc

IRIX Local Kernel Memory Disclosure / Denial Of Service

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.








isc

SkyWrapper Discovery Tool

SkyWrapper is a tool from CyberArk that helps to discover suspicious creation forms and uses of temporary tokens in AWS.