Monthly Archives: April 2015
Adobe Flash Player casi32 Integer Overflow
This Metasploit module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the casi32 method, where an integer overflow occurs if a ByteArray of length 0 is setup as domainMemory for the current application domain. This Metasploit module has been tested successfully on Windows 7 SP1 (32-bit), IE 8 to IE 11 and Flash 15.0.0.167.
Mac OS X Rootpipe Privilege Escalation
This Metasploit module exploits a hidden backdoor API in Apple’s Admin framework on Mac OS X to escalate privileges to root, dubbed Rootpipe. Tested on Yosemite 10.10.2 and should work on previous versions. The patch for this issue was not backported to older releases. Note: you must run this exploit as an admin user to escalate to root.
Aircrack-ng Wireless Network Tools 1.2 RC2
aircrack-ng is a set of tools for auditing wireless networks. It’s an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
WordPress Fusion Engage Local File Disclosure
WordPress Fusion Engage plugin suffers from a local file disclosure vulnerability.
TP-LINK Local File Disclosure
Multiple TP-LINK products suffer from a local file disclosure vulnerability.
WordPress Duplicator 0.5.14 Cross Site Request Forgery / SQL Injection
WordPress Duplicator plugin versions 0.5.14 and below suffer from cross site request forgery and remote SQL injection vulnerabilities.
Magento eCommerce Vulnerable Adobe Flex SDK
Magento eCommerce versions 1.9.0 and below are compiled with a vulnerable version of Adobe Flex SDK allowing for same-origin request forgery and cross-site content hijacking.
Hippo CMS 7.9.7 Enterprise Edition CRLF Injection
Hippo CMS version 7.9.7 Enterprise Edition suffers from a CRLF header injection vulnerability.
Pimcore CMS 3.0.5 Cross Site Request Forgery
Pimcore CMS version 3.0.5 suffers from a cross site request forgery vulnerability.