exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-03-03

Deimos Kasa 2.58 Local Integer Overflow
Posted Mar 3, 2010
Authored by LiquidWorm

Deimos Kasa versions 2.58 and below suffer from a local integer overflow vulnerability.

tags | advisory, overflow, local
SHA-256 | 80ab77904eacba3dc8c30ad3a714933a70e7c038b12b93dbb3f71e6b1bc649d4
Opea 10.50 Integer Overflow
Posted Mar 3, 2010
Authored by Marcin Ressel

Opera versions 10.10 through 10.50 integer overflow exploit.

tags | exploit, overflow
SHA-256 | 9a1f1a9cf0bfc1ba896452fd1ab726e986267ff92d738bef82fa08ecdf80215a
Cisco Security Advisory 20100303-dmp
Posted Mar 3, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability exists in the Cisco Digital Media Player that could allow an unauthenticated attacker to inject video or data content into a remote display.

tags | advisory, remote
systems | cisco
advisories | CVE-2010-0573
SHA-256 | 3fa4dc43817fe2c4c515203f2c9eb609e2d9fd348282f7612c4e9c7cc49657b6
Cisco Security Advisory 20100303-dmm
Posted Mar 3, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco Digital Media Manager (DMM). These issues relate to default credentials, privilege escalation, and information leakage.

tags | advisory, vulnerability
systems | cisco
advisories | CVE-2010-0570, CVE-2010-0571, CVE-2010-0572
SHA-256 | 52ae925f5052e20be33ce56ba6c459e54689386676e0972797edae57e1eb3405
Smart Plugs 1.3 SQL Injection
Posted Mar 3, 2010
Authored by Easy Laster

Smart Plugs version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 87b7b06d9a1e6448d4189dd2c98a5a514063e9add7bcb97671677927feb2b58e
Micronation Banking System Command Execution
Posted Mar 3, 2010
Authored by JosS | Site spanish-hackers.com

Micronation Banking System suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 407668deff1186ab965cf07cb067b72497244f5169ddfd50c8567f06ce38beb6
TOR Virtual Network Tunneling Tool 0.2.1.24
Posted Mar 3, 2010
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes a huge client-side performance bug, makes Tor work again on the latest Mac OS X, and updates the location of a directory authority.
tags | tool, remote, local, peer2peer
SHA-256 | 078e7d4a4b1a184fe4f4312abb1cf17a03675a6c42301154c0325f24212cabca
Cisco Security Advisory 20100303-cucm
Posted Mar 3, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified Communications Manager (formerly Cisco CallManager) contains multiple denial of service (DoS) vulnerabilities that if exploited could cause an interruption of voice services. The Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) and Computer Telephony Integration (CTI) Manager services are affected by these vulnerabilities.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
advisories | CVE-2010-0587, CVE-2010-0588, CVE-2010-0590, CVE-2010-0591, CVE-2010-0592
SHA-256 | d6ba069f2d158011c9680e4c386b9aa7a7108a1310a92709c0c29c08bcc704bc
Ubuntu Security Notice 906-1
Posted Mar 3, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 906-1 - It was discovered that the CUPS scheduler did not properly handle certain network operations. A remote attacker could exploit this flaw and cause the CUPS server to crash, resulting in a denial of service. Ronald Volgers discovered that the CUPS lppasswd tool could be made to load localized message strings from arbitrary files by setting an environment variable. A local attacker could exploit this with a format-string vulnerability leading to a root privilege escalation. The default compiler options for Ubuntu 8.10, 9.04 and 9.10 should reduce this vulnerability to a denial of service.

tags | advisory, remote, denial of service, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2009-3553, CVE-2010-0302, CVE-2010-0393
SHA-256 | 783975e6aa85cde70e4595b4adf640e8da102064338a4cfbdd88092e933eebb3
Dosya Yukle Scripti 1.0 Shell Upload
Posted Mar 3, 2010
Authored by indoushka

Dosya Yukle Scripti version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 04d8bd308497774bb2ee53a18e1d7803887797f335aa9ea624d21c2b207b5f1c
Gentoo Linux Security Advisory 201003-1
Posted Mar 3, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201003-1 - Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges. Versions less than 1.7.2_p4 are affected.

tags | advisory, arbitrary, local, root, vulnerability
systems | linux, gentoo
SHA-256 | 393266db70023763a97f465facf2fdf5e2ad2164c17cefe8ab9e4d0d20f65e9b
Microsoft OWC Spreadsheet HTMLURL Buffer Overflow
Posted Mar 3, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a buffer overflow in Microsoft's Office Web Components. When passing an overly long string as the "HTMLURL" parameter an attacker can execute arbitrary code.

tags | exploit, web, overflow, arbitrary
advisories | CVE-2009-1534
SHA-256 | 62af271be942f6f55dcf24ea35dcb2372b11bd7391f408ea6ae7a854ad04f5f7
Google Gears For Attackers
Posted Mar 3, 2010
Authored by Lavakumar Kuppan | Site andlabs.org

This is a whitepaper called Google Gears for Attackers, Data Theft and Backdoor Placement Attacks on Google Gears' Users.

tags | paper
SHA-256 | 0899d0aed5b31915bdfd739e61e03b795f20e69f79db11a3ff3585a354994390
Flash + IE = Prison Break
Posted Mar 3, 2010
Authored by Lavakumar Kuppan | Site andlabs.org

This is a whitepaper called Flash + IE = Prison Break, Stealing Local Files through the Flash Plugin in IE.

tags | paper, local
SHA-256 | 49ec16758a2de5b1797b315197bc0afb258e9cd3525e46a159669dc3ff323c1e
Gnat-TGP 1.2.20 Remote File Inclusion
Posted Mar 3, 2010
Authored by cr4wl3r

Gnat-TGP versions 1.2.20 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4058428efafb67cfcb91ddcdcb2929f5a495167564afa99e1f29031e089a37ba
Core Security Technologies Advisory 2009.0913
Posted Mar 3, 2010
Authored by Core Security Technologies, Diego Juarez, Nadia Rodriguez

Core Security Technologies Advisory - Luxology Modo 401 suffers from an integer overflow vulnerability when parsing .LXO files.

tags | exploit, overflow
advisories | CVE-2010-0766
SHA-256 | 51b9cf82b285e0e429b33854d143984df2fb806fbb892adaa88ca3f6cc587050
SEC-T 2010 Call For Papers
Posted Mar 3, 2010
Site sec-t.org

The SEC-T 2010 Call For Papers has been announced. It will be held from September 9th through the 10th in Stockholm, Sweden.

tags | paper, conference
SHA-256 | bba867c4b4fc3bcf2f0996e730a36c85739130d541259d3ec22f0a0b6db61c33
Todd Miller sudoedit Root Exploit
Posted Mar 3, 2010
Authored by Kingcope

Todd Miller sudo 'sudoedit' local root exploit that affects 1.6.x versions before 1.6.9p21 and 1.7.x versions before 1.7.2p4.

tags | exploit, local, root
SHA-256 | 0bc5ddb8c9f78020b6fdf754af735e0f64922f9795dab864f38f4d35c23c24d5
Secunia Security Advisory 38762
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for sudo. This fixes multiple security issues, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 9a798adb24fb88725a744a2f23bda5f72da0faaf13315dcfa24f1c32dc562335
Secunia Security Advisory 38782
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nikolas Sotiriu has reported a security issue in McAfee LinuxShield, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | e50ed7fe1f5df8ca48a5d88b5154a1e1dceb20d46dd06e4028c96c0b5f247b5d
Secunia Security Advisory 38745
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Calendar Base extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 5699968bb11dd732e60949967711a08b82f16a873abe8f1994b018e38c4e201b
Secunia Security Advisory 38779
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some security issues and some vulnerabilities, which can be exploited by malicious, local users to manipulate certain data, bypass certain security restrictions, disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | 21f93970fd7cd7089d7bc36abc550015170e09ff7816f13f8fd778fd3aa7655c
Secunia Security Advisory 38806
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Yaniv Miron has reported a vulnerability in Oracle Siebel CRM, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 955b21cfb2022dce4b2b212019dba30b4d149d67ba9aa67d97f16eb9b5ed3a10
Secunia Security Advisory 38784
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Modo 401, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | fd7883b29e20eabf783cd7b721ec42293ff4c8172b90f6ddd7f05205aa979cd1
Secunia Security Advisory 38793
Posted Mar 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Yaniv Miron has reported a vulnerability in ARISg, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e54ae3d35f69a97a23d2b411bc51ec16a58c9c4ecf8f43889ccbba6bdc72bfa0
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close