what you don't know can hurt you
Showing 1 - 10 of 10 RSS Feed

Files from Secunia Research

Email addressvuln at secunia.com
First Active2005-09-20
Last Active2011-11-13
Support Incident Tracker 3.65 Remote Command Execution
Posted Nov 13, 2011
Authored by Secunia Research, juan vazquez | Site metasploit.com

This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.

tags | exploit, arbitrary, shell, php, vulnerability, file upload
advisories | CVE-2011-3829, CVE-2011-3833, OSVDB-76999, OSVDB-77003
MD5 | 739ddfe0d298d16369d8b7893cefd2ef
secunia-htmsr.txt
Posted Apr 14, 2008
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in Lotus Notes, which can be exploited by malicious people to compromise a user's system. A boundary error within the HTML speed reader (htmsr.dll) when handling links in e.g. the "background" attribute of BODY tags can be exploited to cause a stack-based buffer overflow. A boundary error within the HTML speed reader (htmsr.dll) when handling e.g. the "src" attribute of IMG tags can be exploited to cause a stack-based buffer overflow. A boundary error within the HTML speed reader (htmsr.dll) when handling large chunks of data inside an HTML document can be exploited to cause a heap-based buffer overflow. Lotus Notes version 7.0.2 and 7.0.3 are affected.

tags | advisory, overflow, vulnerability
advisories | CVE-2008-0066
MD5 | a558444c02a80ac7014bcf1ad4adba8f
secunia-lotusnotes.txt
Posted Apr 14, 2008
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which can be exploited by malicious people to compromise a user's system. A boundary error within kvdocve.dll when processing overly long paths can be exploited to cause a buffer overflow via e.g. an overly long link inside the "src" attribute of an <IMG> tag in an HTML document. Lotus Notes versions 7.0.2 and 7.0.3 are affected.

tags | advisory, overflow
advisories | CVE-2008-1101
MD5 | c73dd6de3a917119766b3fc6935c9997
Secunia-tbird.txt
Posted Jan 22, 2006
Authored by Secunia Research | Site secunia.com

Secunia Research 17/01/2006 - Secunia Research has discovered a vulnerability in Thunderbird, which can be exploited by malicious people to trick users into executing arbitrary programs.

tags | advisory, arbitrary
MD5 | 1c0d0c90ed907c3a99e03db3009ea690
secunia-IceWarp.txt
Posted Dec 29, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in IceWarp Web Mail, which can be exploited by malicious users and by malicious people to disclose potentially sensitive information and to compromise a vulnerable system.

tags | advisory, web, vulnerability
MD5 | aff9785b36131a1c01ce2292d1cf2250
secunia-Pegasus.txt
Posted Dec 28, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered two vulnerabilities in Pegasus Mail, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | fd0d2ce2e6935007573d41d5f6afab77
Secunia-ZipGenius.txt
Posted Oct 24, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in ZipGenius, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 1639a888182765143fda130b6b7e89c2
Secunia-MySource.txt
Posted Oct 24, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in MySource, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 279e2117f7ee259c0cbeed30a5dd90fe
secunia-netmail-3.52C
Posted Oct 13, 2005
Authored by Secunia Research | Site secunia.com

Secunia research has discovered a vulnerability in Novell NetMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 263a60103b4e01258895d858943ff40d
secunia-Ahnlab.txt
Posted Sep 20, 2005
Authored by Secunia Research | Site secunia.com

Ahnlab V3 Antivirus suffers from multiple vulnerabilities including privilege escalation and security bypass.

tags | advisory, vulnerability
MD5 | 0e51219b512bc932a71776ab36225069
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close