what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 931 RSS Feed

Files Date: 2010-12-01 to 2010-12-31

Secunia Security Advisory 42747
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
SHA-256 | 8ca838d389bc5a6d9f3ad46602b768d9795036f43cfedd1ede53839ac2ebdb3f
Secunia Security Advisory 42726
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the PECL phar extension, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 4d3bbd200f0579a40b2a835db5d2f0f72811853217e71b3111995b48f8d015d3
Secunia Security Advisory 42757
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for perl-IO-Socket-SSL. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, perl
systems | linux, fedora
SHA-256 | bbd62fed4980fb4bc0a3791899a0efd566fdcac7020d49804cf38de2a8b432fa
Secunia Security Advisory 42754
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in SocialEngine Music Sharing Plugin, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | fdb9a1b8ffe07e647d69dfb0c11b6034b981348a6e00a28baae1dc7ff9704d48
Secunia Security Advisory 42750
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in httpdASM, which can be exploited by malicious people to disclose system information.

tags | advisory
SHA-256 | 85880f2d58ff8eb7eff54886a01d202616d9050c66654732aede035bcbec8099
Secunia Security Advisory 42756
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ideh Pardaz Easy Portal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ca90a61d8c0bfcdfb26ed31b93416e9525d28c6e477115f64cca7c1c75664cf4
Secunia Security Advisory 42751
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has discovered some vulnerabilities in Coppermine Photo Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | fa765aab7aa3617bd66915ca903706474a5d30913f0d3cf1f6d12580897c66b6
Chaosmap 1.0
Posted Dec 28, 2010
Authored by Bastian Ballmann | Site datenterrorist.de

Chaosmap is just another network mapping tool. It can look up DNS names using a dictionary file with or without a salt.

tags | tool
systems | linux, unix
SHA-256 | f04fca84f94249e3967be6dc27fbef44a114c4cc30bc3fc9ad6725ff87953c88
Microsoft Windows Fax Services Cover Page Editor Memory Corruption
Posted Dec 28, 2010
Authored by rgod | Site retrogod.altervista.org

Microsoft Windows Fax Services Cover Page Editor (.cov) memory corruption exploit.

tags | exploit
systems | windows
SHA-256 | 38392677c85a82b9969b7d0008e18d2146a9d58995622384260f9a6004234ec8
CruxCMS 3.0.0 Bypass / Shell Upload / SQL Injection / XSS / LFI
Posted Dec 27, 2010
Authored by Janek Vind aka waraxe | Site waraxe.us

CruxCMS version 3.0.0 suffers from cross site scripting, local file inclusion, authentication bypass, shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 5375e0a5494a05b2ea69af210a5d3d1856065f95387bd5c4db520a4274857a70
Pligg 1.1.2 Cross Site Scripting / SQL Injection
Posted Dec 27, 2010
Authored by Michael Brooks

Pligg version 1.1.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | a4b977de49aa1f010340248f34dafceb8357165d75c9d7d5b3a405ab75de0860
Asan Portal SQL Injection
Posted Dec 27, 2010
Authored by Securitylab Security Research | Site securitylab.ir

Asan Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 466d652bd90858c69426408bbe2e8972b048bc168cb7c25484b1faad4b1f0204
LiveZilla Cross Site Scripting
Posted Dec 27, 2010
Authored by Rodrigo Rubira Branco

LiveZilla versions prior to 3.2.0.2 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-4276
SHA-256 | f6edeefe91536b6d753f952535513ed99b5fedfaf49618dcb53bf3a41941f022
Zero Day Initiative Advisory 10-300
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-300 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability. The flaw exists within the nipplib.dll component used by the the Mozilla and Internet Explorer browser plugins for iPrint client. When parsing an HTTP response the Connection response length is in sufficiently validated before being copied into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, web, arbitrary
SHA-256 | b5172e44a55440caca829a0e3c9c9bff6d4ce99f97233fc051e0705a09738a92
DD-WRT 24-preSP2 Information Disclosure
Posted Dec 27, 2010
Authored by Craig Heffner | Site devttys0.com

Remote attackers can gain sensitive information about a DD-WRT router and internal clients, including IP addresses, MAC addresses and host names. This information can be used for further network attacks as well as very accurate geolocation. This is exploitable even if remote administration is disabled. Version 24-preSP2 is affected.

tags | exploit, remote, info disclosure
SHA-256 | 7102053c920ae264843dc40d0a21522a645ecbba49d6f4df097245cfdadc92f8
Zero Day Initiative Advisory 10-299
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-299 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability. The flaw exists within the nipplib.dll component which is used by both the Mozilla and IE browser plugins for iPrint Client. When handling an IPP response from a user provided printer-url the process does not properly validate the size of the destination buffer and copies user supplied data of an arbitrary length into a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, arbitrary
SHA-256 | a2dc5261e2ebca49ad9b9e56b4a8249c7cad6f31d98330db68fcf278f1a1b1db
Zero Day Initiative Advisory 10-298
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-298 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability. The flaw exists within the npnipp.dll Mozilla browser plugin for iPrint client. When assembling a URL using the user supplied call-back-url, the value is passed into a urlencode function where it is copied into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, arbitrary
SHA-256 | 0aedc93a06314c97bfd0b51a3074c516453bf76cee04807f000703bc99639072
HP Security Bulletin HPSBST02619 SSRT100281 2
Posted Dec 27, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBST02619 SSRT100281 2 - A potential security vulnerability has been identified with HP StorageWorks Storage Mirroring. This vulnerability could be exploited remotely to execute arbitrary code. Revision 2 of this advisory.

tags | advisory, arbitrary
SHA-256 | aaa0797dfb14d4c1908eaee02d181801c6ace74cf07fe336cc296364f5d6415c
OpenClassifieds 1.7.0.3 Chained: Captcha Bypass -> SQL Injection -> XSS on Frontpage
Posted Dec 27, 2010
Authored by Michael Brooks

OpenClassifieds version 1.7.0.3 chained exploit that leverages CAPTCHA bypass, remote SQL injection, and persistent cross site scripting on Frontpage.

tags | exploit, remote, xss, sql injection
SHA-256 | 6821ebbc330e3b9f6d23a296ea9c5198596f11f20095f0d1a2423f3880e93a21
Sigma Portal Denial Of Service
Posted Dec 27, 2010
Authored by Pouya Daneshmand

Sigma Portal suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 593b1cbc190866506dfcef5f9d9f43fa59e91023a3ad7d364d5ecf5288b68e9d
Zero Day Initiative Advisory 10-297
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-297 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability. The flaw exists within the nipplib.dll component which is used by both the Mozilla and IE browser plugins for iPrint Client. When handling an HTTP 301 response from a user provided printer-url the process attempts to copy the returned value within the Location HTTP header without ensuring that the destination buffer is adequately sized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, web, arbitrary
SHA-256 | 65ced00f19a79e903c62e1325190e092c6ab2ede41c7a1d3bd23b17a3e2ba098
Zero Day Initiative Advisory 10-296
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-296 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the nipplib.dll component which is used by both the Mozilla and IE browser plugins for iPrint Client. When handling an IPP response from a user provided printer-url the process does not properly validate the size of the destination buffer and copies user supplied data of an arbitrary length into a fixed length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, arbitrary
SHA-256 | 98e4858550b4ef9237d6ad86f8954eeb693c4594e6e60b203817c71911209636
Zero Day Initiative Advisory 10-295
Posted Dec 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-295 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the both the Netscape (Firefox) and ActiveX (Internet Explorer) plugin components npnipp.dll and ienipp.ocx which are installed by default with the iPrint client. When handling the printer-state-reasons operation provided via the embed tag the module makes a request to the specified printer-url and performs insufficient validation of the size of the printer-state-reasons status response. The process then copies this user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, remote, arbitrary, activex
SHA-256 | 1a444b90128533e815e8cfb508e60327b810b7bd2bb1a698ab98b745fc9317a3
Writing Simple Buffer Overflow Exploits
Posted Dec 27, 2010
Authored by D4rk357

Whitepaper called Writing Simple Buffer Overflow Exploits.

tags | paper, overflow
SHA-256 | b6a068f95d8506debdbb0b649228a40f2892304ec1e6abf7820a0602965ef614
Web@All 1.1 Remote Admin Settings Change Exploit
Posted Dec 27, 2010
Authored by giudinvx

Web@All versions 1.1 and below remote administrative settings changing exploit.

tags | exploit, remote, web, add administrator
SHA-256 | f8d27969b53893e2eb3f8f56f6ca3224588ae76337b77ecd6eecd6f3410fd24a
Page 4 of 38
Back23456Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close