exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 84 RSS Feed

Files Date: 2010-09-11

Mandriva Linux Security Advisory 2010-174
Posted Sep 11, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-174 - Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering message. bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message. Updated packages are available that bring Quagga to version 0.99.17 which provides numerous bugfixes over the previous 0.99.12 version, and also corrects these issues.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-2948, CVE-2010-2949
SHA-256 | ec993131ec6e8a1de414871971cba8566aa98e8ba58460c10d815b5119462a1b
Joomla NKC 2.0.b Beta SQL Injection
Posted Sep 11, 2010
Authored by Valentin Hoebel

The Joomla NKC component version 2.0.b Beta suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 45ca253843d6ea6b03b81c6912b72fd22f8e7295cc1a5e8fdfd47157c943c25b
Mandriva Linux Security Advisory 2010-173
Posted Sep 11, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-173 - Security issues were identified and fixed in firefox and mozilla-thinderbird. Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests. Cross-site scripting vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled. Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting protection mechanisms via UTF-7 encoding. Various other issues were addressed.

tags | advisory, remote, web, arbitrary, xss
systems | linux, mandriva
advisories | CVE-2010-2764, CVE-2010-2769, CVE-2010-2768, CVE-2010-2762, CVE-2010-2766, CVE-2010-3167, CVE-2010-3168, CVE-2010-2760, CVE-2010-2765, CVE-2010-3166, CVE-2010-2767, CVE-2010-3169
SHA-256 | d2c5330326c33ebfdc1dc274a3d9263970b7874baf781cfc5de60069bb4084fe
Mandriva Linux Security Advisory 2010-172
Posted Sep 11, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-172 - Some vulnerabilities were discovered and corrected in the Linux kernel. Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service via unspecified vectors. The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a cache stuffing issue and MS-DFS referrals. The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server. Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service via a write operation on the last block of a large file, followed by a sync operation.

tags | advisory, denial of service, overflow, arbitrary, kernel, local, spoof, vulnerability
systems | linux, mandriva
advisories | CVE-2010-2240, CVE-2010-2492, CVE-2010-2524, CVE-2010-3015
SHA-256 | 0270ee39ecc23658fc44a57fdd5c09faa6452958070bb6def481339131293b2f
HP Security Bulletin HPSBMA02576 SSRT090231
Posted Sep 11, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Data Protector Express 3.x and 4.x and HP Data Protector Express Single Server Edition (SSE) 3.x and 4.x running on supported Microsoft Windows, Linux, and NetWare versions. The vulnerability could be exploited locally to create a Denial of Service (DoS) or to execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, windows
advisories | CVE-2010-3007
SHA-256 | bd76bd81e2bd9ffc8e33d524e77b2eeb4d90efd1e55ce6090fdc981ca499d06c
Piwigo 2.1.2 Cross Site Request Forgery / Cross Site Scripting / SQL Injection
Posted Sep 11, 2010
Authored by Sweet

Piwigo version 2.1.2 suffers from cross site request forgery, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 28658223e8717711723c5561cdd621ea5afc21de0d1b7921146a8ddfbf3e0689
Mechbunny PaysiteReviewCMS Cross Site Scripting
Posted Sep 11, 2010
Authored by Valentin Hoebel

Mechbunny PaysiteReviewCMS suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d0154411fd57aa82f3e94396e50469c4028f68d806217fdbfbd681540818cada
YOPS Remote Command Execution
Posted Sep 11, 2010
Authored by ipax | Site dclabs.com.br

YOPS (Your Own Personal [WEB] Server) version 2009-11-30 suffers from a remote buffer overflow vulnerability.

tags | exploit, remote, web, overflow
SHA-256 | 6694052f138560b7bda843c825debc8144e0312b513297460d9966fb3c62c18d
Mechbunny Porn Tube Search Cross Site Scripting / Redirection
Posted Sep 11, 2010
Authored by Valentin Hoebel

Mechbunny Porn Tube Search Script suffers from cross site scripting and redirection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 518ae81e989dd2abe6ef51e44ec44a1f41d5e60ff7af603d71f1cf87d9885065
NMB Scanner 1.2.6
Posted Sep 11, 2010
Authored by Gregoire Barbier | Site gbarbier.free.fr

NMB Scanner scans the shares of a SMB network, using the NMB and SMB protocols. It is useful for acquiring information on a local area network for such purposes as security auditing. It can obtain such information as NMB/SMB/Windows hostname, IP address, IP hostname, ethernet MAC address, Windows username, NMB/SMB/Windows domain name, and master browser. It can discover all the NMB/SMB/Windows hosts on a local area network by using the hosts lists maintained by master browsers.

Changes: Public share listing support, some MAC address listing improvements such as split ARP-queried and SMB-queried MAC addresses and the hiding of null MAC addresses, and other minor improvements.
tags | tool, local, scanner, protocol
systems | windows, unix
SHA-256 | 1839ed5bbb6e562b6fc3078a43108380f49de81ea8f373981936514bbf33b20d
Acoustica MP3 Audio Mixer 2.471 SEH Overwrite
Posted Sep 11, 2010
Authored by Carlos Hollmann

Acoustica MP3 Audio Mixer version 2.471 extended M3U directives SEH overwrite exploit.

tags | exploit
SHA-256 | 5f65fda8a52e928e30cb002051bc610a4c6407dffb14c0c14d87a9a5030c7818
Webkit Memory Corruption
Posted Sep 11, 2010
Authored by Jose Antonio Vazquez Gonzalez

Webkit on Apple Safari versions prior to 4.1.2 and 5.0.2 and Google Chrome versions prior to 5.0.375.125 suffers from a memory corruption vulnerability.

tags | exploit
systems | apple
advisories | CVE-2010-1813
SHA-256 | 6377799e8809d0dbb51d80694c28c4c192e86d2cb2313c813d9801888e3a7294
Symphony 2.0.7 SQL Injection / Cross Site Scripting
Posted Sep 11, 2010
Authored by JosS

Symphony version 2.0.7 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9e0f7a4ba8f09c788eb72a6fb9e7a23197821bea038771805deb72f75770325d
HexInject 1.1
Posted Sep 11, 2010
Authored by crossbower | Site hexinject.sourceforge.net

HexInject is a hexadecimal and raw packet injector and sniffer. It can be easily combined with other tools to provide a powerful command line framework for raw network access. It will automatically set the correct checksum (IP, TCP, UDP, ICMP).

tags | tool, udp, sniffer, tcp
SHA-256 | 050852f89ea501c7bad768a694f8fd2d5f0c3de68da82647a1cb7aeb68e96e27
CubeCart 4.3.3 SQL Injection / Cross Site Scripting
Posted Sep 11, 2010
Authored by Bogdan Calin | Site acunetix.com

CubeCart version 4.3.3 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 600d0c3f5e5a138d60205734fdf0c28a709c143c166dc4b1a8e1a426b2cb6ef4
ColdUserGroup 1.6 Bypass / Cross Site Scripting
Posted Sep 11, 2010
Authored by Sangteamtham

ColdUserGroup version 1.6 suffers from bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | 1c5a99bcb58f359d14f0e00ad65758ce97e63940556403935c0e48947a389f40
Adobe Flash Player IE Insecure DLL Hijacking
Posted Sep 11, 2010
Authored by Aung Khant | Site yehg.net

Adobe Flash Player IE version 10.1.x suffers from an insecure DLL hijacking vulnerability.

tags | advisory
SHA-256 | cd6fde290e229888c688e0d739ef19586f3fef3bc6d4124fc6a738dbf4b6313c
PGP Desktop Insecure DLL Hijacking
Posted Sep 11, 2010
Authored by Aung Khant | Site yehg.net

PGP Desktop versions 9.10.x through 10.0.0 suffers from an insecure DLL hijacking vulnerability.

tags | advisory
SHA-256 | de89dfbe16b32769986face644e72af66bc271e3b36d7f2d469df0bdb8963be0
Debian Linux Security Advisory 2107-1
Posted Sep 11, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2107-1 - Dan Rosenberg discovered that in couchdb, a distributed, fault-tolerant and schema-free document-oriented database, an insecure library search path is used; a local attacker could execute arbitrary code by first dumping a maliciously crafted shared library in some directory, and then having an administrator run couchdb from this same directory.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2010-2953
SHA-256 | 0194e67c78e874b34b2680bb3816836652836014dbf1cc348774a986c3f237f1
CVE Checker 0.6
Posted Sep 11, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reporting performance was improved tremendously for recent SQLite libraries. Reporting on found software, regardless of it matching a CVE entry, was added, and quite a few bugs were fixed.
tags | vulnerability
systems | unix
SHA-256 | 818a0fa17c65124e82df8e30ae5679aee65d7f9646353fdb97f393b14c2a6bd1
Elliptic Curve Cryptography Anomalous Curves
Posted Sep 11, 2010
Authored by Alonso De Jesus Garcia Herrera, Carlos Mario Penagos Hollmann

Whitepaper called Elliptic Curve Cryptography Anomalous Curves. Written in Spanish.

tags | paper
SHA-256 | c45415603979c78761b5dc3c885231f762afa6be15075f10d182a3ec944861fa
Month Of Abysssec Undisclosed Bugs - ASP Nuke 0.80
Posted Sep 11, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - ASP Nuke version 0.80 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection, asp
SHA-256 | 3019201267ca9f3334f0cf34818c849f5aae0278a3fcd5cc23bca3b04cf99060
Month Of Abysssec Undisclosed Bugs - Microsoft Word
Posted Sep 11, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Microsoft Office Word 2007 suffers from a sprmCMajority related buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2010-1900
SHA-256 | d21c564cb52ae5bf024afc7f42265f413b00bb89a9c10a9d67600f923aaafb61
Month Of Abysssec Undisclosed Bugs - Excel RTD Memory Corruption
Posted Sep 11, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Excel RTD suffers from a memory corruption vulnerability.

tags | advisory
advisories | CVE-2010-1246
SHA-256 | f82f766b21bb23caaec65b2b83b3d28efbc5747382f700e2335c40cb2d7f5231
Month Of Abysssec Undisclosed Bugs - aradBlog 1.2.8
Posted Sep 11, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - aradBlog versions 1.2.8 and below suffer from shell upload and remote administrative access vulnerabilities.

tags | advisory, remote, shell, vulnerability
SHA-256 | 166bacd4234ddb6a449cc921c4ab532653e203f38fe8f8340028b842dc41f317
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close