Day: September 9, 2013

GNU SIP Witch Telephony Server 1.8.0

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate…….


MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free

In IE8 standards mode, it’s possible to cause a use-after-free condition by first creating an illogical table tree, where a CPhraseElement comes after CTableRow, with the final node being a sub table element. When the CPhraseElement’s outer content is reset by using either outerText or outerHTML through an event handler, this triggers a free of…


HP SiteScope Remote Code Execution

This Metasploit module exploits a code execution flaw in HP SiteScope. The vulnerability exists on the opcactivate.vbs script, which is reachable from the APIBSMIntegrationImpl AXIS service, and uses WScript.Shell.run() to execute cmd.exe with user provided data. Note which the opcactivate.vbs component is installed with the (optional) HP Operations Agent component. The module has been tested…


Dropbox is like Microsoft, says startup’s CEO

The cloud storage company’s CEO Drew Houston says the company balances consumer and enterprise much like Microsoft has done. He also talks about why Dropbox needs a new mobile app and why it’s not going public any time soon…….


Android FTP Server 1.2 Privilege Escalation

Android FTP Serve version 1.2 exposes the configuration file with full read and write permissions. A malicious party can overwrite the credentials for the administrator and escalate privileges…….


Keeping Data Secret, Even From Apps That Use It

Nerval’s Lobster writes “Datacenters wanting to emulate Google by encrypting their data beyond the ability of the NSA to crack it may get some help from a new encryption technique that allows data to be stored, transported and even used by applications without giving away any secrets. In a paper to be presented at a…


lshell 0.9.16

lshell lets you restrict a user’s shell environment to limited sets of commands, choose to enable or disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user’s commands, implement timing restrictions, and more…….


Moodle 2.3.9 / 2.4.9 Javascript Insertion

Moodle versions 2.3.9 and below and 2.4.6 suffer from a javascript insertion vulnerability that allows for the addition of an RSS blog…….


Linux “HoT” bank Trojan: Failed malware

What? Another Linux vulnerability? Nope. Other operating systems may be easy malware marks, but Linux continues to resist malware…….


Ruby Gem Features 0.3.0 Injection

Ruby Gem Features version 0.3.0 suffers from a file injection vulnerability that can lead to cross site scripting…….