This Metasploit module exploits a vulnerability in IBM's WebSphere Application Server. An unsafe deserialization call of unauthenticated Java objects exists to the Apache Commons Collections (ACC) library, which allows remote arbitrary code execution. Authentication is not required in order to exploit this vulnerability.
245814ff081bcdcd9c6bfc1eb1dd4c50629fdf8a524c0efc427cb3e3fb0028f9
This Metasploit module exploits a remote code execution vulnerability in Apache Struts version 2.3.5 - 2.3.31, and 2.5 - 2.5.10. Remote Code Execution can be performed via http Content-Type header. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.
0d1583b3fe45147f90ce781625616136ad2241ae276309d87b001d39d32dddbc
Microsoft Windows suffers from a COM session moniker elevation of privilege vulnerability.
dd8361b04b08bf0bdeff67321f010c8cc76f0542fe2db8f9df10c34ea03bfa2a
Adobe Flash suffers from a heap overflow vulnerability in AVC header slicing.
fbef41a0db49fefaee13e0da46006ecb460efa8c48004beb4d978126e1febaff
Adobe Flash suffers from a heap overflow vulnerability in ATF Planar Decompression.
1f3f4804170f55e0594564e62f7f8b2127c2acfc75e1949445ca48090e930764
Adobe Flash suffers from a heap overflow vulnerability in ATF thumbnailing.
c7fb3ad920b9843a00f95e3df1c7cb4d4d12bb712ee93c03c756181ff79a6081
Adobe Flash suffers from a use-after-free in MovieClip attach init object.
288bf2654c07f8a5762dbf1c27ee8dd3db7b77c46a21c4e6c32e26490a40cf2e
Adobe Flash suffers from an out-of-bounds read in metadata parsing.
f2d169c3f1506cdaaae621fd8675063bc4928c96e812355f017f5911c322d44e
Red Hat Security Advisory 2017-0517-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group. On systems using classic /etc/init.d init scripts, the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.
918673f3184d19ca65432b4dd2a898daa11845ad3972723706ee8c318b509fcb
Ubuntu Security Notice 3232-1 - It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
e3cb43396edf3481d45c1af4b3fbe1c60e71adcbf7078c61f82a1858d1103946
This bulletin summary lists eighteen released Microsoft security bulletins for March, 2017.
f71695685090000b284307b25f303c43e7d48a99be46022e430920017cace887
Red Hat Security Advisory 2017-0515-01 - The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage. Ansible is a simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. The following packages have been upgraded to a later upstream version: ceph-installer, ansible, python-passlib, ceph-ansible.
78f243ebadb2587f53a012c34b7ae7de20e0eef82952e18f4fa40930d5aede23
Red Hat Security Advisory 2017-0501-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol implementation freed SKB resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system.
bb30ef2371423d1dbb404edf12f77c42cec1872dcbcfc2a17f6ca8d526e4cc12
b2evolution version 6.8.8 Stable suffers from a remote shell upload vulnerability.
bcba360e0afaf99a5a9d677e78872714b24473535a78eadf42daf7685e541faf
Debian Linux Security Advisory 3808-1 - handling problems and cases of missing or incomplete input sanitising may result in denial of service or the execution of arbitrary code if malformed TGA, Sun or PSD files are processed.
c390b4d5147723f415f7632ea0bbecb4341b30316b8fae0bd7f8fb9fe6e5f63c
Ubuntu Security Notice 3231-1 - Joseph Bisch discovered that Pidgin incorrectly handled certain xml messages. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service, or possibly execute arbitrary code.
3430ac97a55a07d89fc7b0c1fef7489e061ec02f763ebc35af16e51616b1cb22
Red Hat Security Advisory 2017-0498-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 45.8.0. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.
9fdc73c32407a525ce893acb9e0fb80a337aef04c089e87ad448ee14d8c689c6
Red Hat Security Advisory 2017-0499-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 57.0.2987.98. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.
eb4e094164c8a35a4a94ce5d764b3c961f89e49689786250227d63aca7bc7ee0
It was found that the Fetch API in Microsoft Edge allows websites to set arbitrary HTTP request headers, including the Content-Length, and Host headers. Amongst others, a malicious website can use this issue to bypass the same origin policy, read HTTP response headers, or initiate arbitrary HTTP requests from the victim's browser (HTTP request smuggling).
7ea35a8a06080eee5024f0b3b4e9bbcc165e5e2914c82abb99135ab97e6e12f7
Joomla Advertisement Board component version 3.0.4 suffers from a remote SQL injection vulnerability.
372afe7a62de8e916cd7d4d57fd10a6358ba005a9a93f9dea2092ed2b92ba7f8
Joomla Simple Membership component version 3.3.3 suffers from a remote SQL injection vulnerability.
bca94a6f30a1b029c12aa84f64151cad58a232a13c15fd546948f06bb6979320