CVE-2015-7381

Multiple PHP remote file inclusion vulnerabilities in install.php in Web Reference Database (aka refbase) through 0.9.6 allow remote attackers to execute arbitrary PHP code via the (1) pathToMYSQL or (2) databaseStructureFile parameter, a different issue than CVE-2015-6008.

CVE-2015-7382

SQL injection vulnerability in install.php in Web Reference Database (aka refbase) through 0.9.6 allows remote attackers to execute arbitrary SQL commands via the defaultCharacterSet parameter, a different issue than CVE-2015-6009.

CVE-2015-7383

Multiple cross-site scripting (XSS) vulnerabilities in Web Reference Database (aka refbase) through 0.9.6 and bleeding-edge through 2015-04-28 allow remote attackers to inject arbitrary web script or HTML via the (1) adminUserName, (2) pathToMYSQL, (3) databaseStructureFile, or (4) pathToBibutils parameter to install.php or the (5) adminUserName parameter to update.php.

Apport kernel_crashdump symlink vulnerability exploitation

Posted by halfdog on Sep 27

Hello List,

Here [1] is a short write-up of the Ubuntu Apport kernel_crashdump
symlink vulnerabilities fixed today including some POCs.

While symlink exploitation itself is not really exiting, the creation
of a suitable payload is more interesting: logfile data has to be
crafted, so that after splitting in chunks, compression and base64
encoding, the result string must resemble a path to an
attacker-controllable executable. See [1] to read…

Unauthorized Data Manipulation Vulnerability in Orange HRM

Posted by vishnu raju on Sep 27

Hi all,

Greetings from Vishnu (@dH4wk)

Vulnerability title: *Unauthorized Data Manipulation Vulnerability*

Vendor: OrangeHRM

Product: HRM s/w

Affected version: 3.3.1 and below

Fixed version: 3.3.2

**Summary**:

OrangeHRM Open Source is a free HR management system that offers a wealth
of modules to suit the needs of your business. This widely-used system is
feature-rich,
intuitive and provides an essential HR management platform along…

Suricata IDPE 2.0.9

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It’s capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Watchguard XCS Remote Command Execution

This Metasploit module exploits two separate vulnerabilities found in the Watchguard XCS virtual appliance to gain command execution. By exploiting an unauthenticated SQL injection, a remote attacker may insert a valid web user into the appliance database, and get access to the web interface. On the other hand, a vulnerability in the web interface allows the attacker to inject operating system commands as the ‘nobody’ user.