exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 44 RSS Feed

Files Date: 2008-07-17

Zero Day Initiative Advisory 08-044
Posted Jul 17, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the browser's handling reference counters to the nsCSSValue:Array class. Creating more then 65,535 references will overflow a 16-bit reference counter and therefore result in an erroneous free() while the object still exists. Properly manipulated this can result in arbitrary code execution under the context of the current user.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2008-2785
SHA-256 | 49b0435fa9254e135d0b6f015bfd3fa93464f303ac00234d23f8fee521f7a163
Zero Day Initiative Advisory 08-043
Posted Jul 17, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun Java Web Start. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the GetVMArgsOption() function used while parsing the java-vm-args attribute of the j2se tag in xml based JNLP files. When a user downloads a malicious JNLP file, the vulnerable attribute is read into a static buffer. If an overly long value is defined by the java-vm-args attribute, a stack based buffer overflow occurs, resulting in an exploitable condition.

tags | advisory, java, remote, web, overflow, arbitrary
SHA-256 | 04fd83b3273fc8bc309caaabc1eced3bc0a6561c6fc0ee4501f6e08d821426ce
Zero Day Initiative Advisory 08-042
Posted Jul 17, 2008
Authored by Tipping Point, Peter Csepely | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun Java Web Start. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the writeManifest() method of the CacheEntry class. A directory traversal flaw in this method allows the creation of arbitrary files on the target system. After the file has been created, a call to Runtime.getRuntime.exec() can be used to execute the file.

tags | advisory, java, remote, web, arbitrary
SHA-256 | 9c039546ae9269c76b3d796cd08585ded3d5b027c2dd018ef10e757416ff4e92
Secunia Security Advisory 31152
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat Director, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 484544dbbb1e4cb72620a0d9e58b5133825690128c559242bb1ff7e3e8251428
Ubuntu Security Notice 623-1
Posted Jul 17, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 623-1 - A flaw was discovered in the browser engine. A variable could be made to overflow causing the browser to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. Billy Rios discovered that Firefox did not properly perform URI splitting with pipe symbols when passed a command-line URI. If Firefox were passed a malicious URL, an attacker may be able to execute local content with chrome privileges.

tags | advisory, web, denial of service, overflow, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2008-2785, CVE-2008-2933
SHA-256 | 742712b79adb44ac6f189292da21ee47a7e298cb82d206626f47d0691011053a
HP Security Bulletin 2008-00.97
Posted Jul 17, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP Select Identity Active Directory Bidirectional LDAP Connector . The vulnerabilities could be exploited to allow remote unauthorized access.

tags | advisory, remote, vulnerability
advisories | CVE-2008-1665
SHA-256 | 356a8ac4d471a5727f23a6540f9a3ffb6e1ed39004154dec680102ab794d6e59
beaweblogic-exec.txt
Posted Jul 17, 2008
Authored by Kingcope

Bea Weblogic Apache Connector code execution and denial of service exploit.

tags | exploit, denial of service, code execution
SHA-256 | 6d707d6b5df9744b00ca718ea8eb0688964f290196f4d4759a0ab4d9011585dc
debopenssh-auth.txt
Posted Jul 17, 2008
Authored by eliteb0y

It appears that there may be a privilege escalation vulnerability in OpenSSH under Debian due to how SELinux hands out roles.

tags | exploit
systems | linux, debian
SHA-256 | 0279c23d6d13e64604d206c6989dcc20e7cedeb8a7905e7896caad31fb69dfc9
alstrasoftarticle-sql.txt
Posted Jul 17, 2008
Authored by GolD_M | Site tryag.cc

AlstraSoft Article Manager Pro version 1.6 blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 3ccb846b34daa155cd95cb0579ef065e4ef96847cdc0037fd108faf8ab3d6a56
DSECRG-08-029.txt
Posted Jul 17, 2008
Authored by Digital Security Research Group | Site dsecrg.com

Dokeos E-Learning System version 1.8.5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | df7b29ca06e5dd9587bac73d60d862dd5a3890250492ab6361c5a11b4f3876e9
HP Security Bulletin 2008-00.58
Posted Jul 17, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running BIND. The vulnerability could be exploited remotely to cause DNS cache poisoning.

tags | advisory
systems | hpux
advisories | CVE-2008-1447
SHA-256 | a6698f6c2f130a53f26800f57edc750877a09fabe643a9f4c3d5bbdb9c4b0568
alstrasoftvideo-sql.txt
Posted Jul 17, 2008
Authored by Hussin X | Site tryag.cc

AlstraSoft Video Share Enterprise version 4.5.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 683c806dabcda3109413aafe3b8cea6579e65e9120fc04ab567ed4164c32f3f6
ppmate-dospoc.txt
Posted Jul 17, 2008
Authored by Guido Landi

PPMate PPMedia Class ActiveX control buffer overflow proof of concept exploit.

tags | exploit, denial of service, overflow, activex, proof of concept
SHA-256 | 76cac4af6558ea52ac9df437063fb13277db91ca8c2a32884614b1fe93fd5586
phphoo3526-sql.txt
Posted Jul 17, 2008
Authored by Mr.SQL | Site pal-hacker.com

phpHoo3 versions 5.2.6 and below suffer from a SQL injection vulnerability in phpHoo3.php.

tags | exploit, php, sql injection
SHA-256 | a1e97ef8a5446e98a30c94d679401d7993cccdcad3888ed1a0490a8da760970a
Secunia Security Advisory 31013
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in MyBB.

tags | advisory, vulnerability
SHA-256 | 2e12f2bed9c713296aef642a7fefcd669d051d277a1a5c67d3e1fdf6bc21676b
Secunia Security Advisory 31087
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported for various Oracle products. Some vulnerabilities have unknown impacts while others can be exploited by malicious, local users to gain escalated privileges, by malicious users to cause a DoS (Denial of Service), disclose sensitive information, gain escalated privileges, or compromise a vulnerable system, and by malicious people to bypass certain security restrictions or to cause a DoS.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 60fb5346b631684cc0f547e09513c5e4519e0bc00afcfc8d71577b74ce35daa7
Secunia Security Advisory 31095
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has discovered a vulnerability in Black Ice Document Imaging SDK, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | bd19027b04e785f11848ac7da9c5bc4e2a32cc41ddfc1dbed46c73438e18650f
Secunia Security Advisory 31109
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenBSD has issued an update for X.Org. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | openbsd
SHA-256 | 58fda1fdc5c5f6f238b1f958934cb1589b04923f1d1420f5418d555361ed42d4
Secunia Security Advisory 31124
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, and by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, redhat
SHA-256 | bd4f8f9228c1da56dd517f7f8fd17f835c0e9fa896d9e463f580aac0dcb37a2a
Secunia Security Advisory 31143
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | a1349f1b5d100cf629285293ef941138506f367929bf70b4f6e0346f2d5cb1d0
Secunia Security Advisory 31151
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat ProxySG, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | 4a93f69b0038d708ba3114ed0a82534f73df5ead2a96109b0d4e6e93b7aa1f32
draft-ietf-tsvwg-port-randomization-01.txt
Posted Jul 17, 2008
Authored by Fernando Gont, Michael Vittrup Larsen | Site ietf.org

This document describes a simple and efficient method for random selection of a client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. The mechanisms described in this document are a local modification that may be incrementally deployed, and that does not violate the specifications of any of the transport protocols that may benefit from it, such as TCP, UDP, SCTP, DCCP, and RTP.

tags | paper, local, udp, tcp, protocol
SHA-256 | 1ce58606d3eddff9223fe3a488f8c0cc0f6238e521811ffc418b4dd84491b12b
Secunia Security Advisory 31108
Posted Jul 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Mercurial, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | b610dcd804637d8efae5461c7b32f0f4caaf929026bc4b4ca27b01677b4a7036
openpro-rfi.txt
Posted Jul 17, 2008
Authored by Ghost Hacker | Site real-hack.net

openPro version 1.3.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 0fddf9f46c55b2b8481c2aff74df61b519b1bfa1c18c0010e9ce23aa1572cff0
AntiPhishing.pdf
Posted Jul 17, 2008
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.

SHA-256 | 8f1e3d61a767523a1c71c153736d8ce06f404313b5babf7871ef36575d630b2e
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close