what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from LSsec

First Active2006-10-12
Last Active2007-01-14
LSsec Security Advisory 2006-03-30
Posted Jan 14, 2007
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup version 11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system.

tags | advisory, arbitrary
SHA-256 | cffb5e89758db2018d711587005164f30dedaaa571b7cd3c135a33530295b5db
LSsec Security Advisory 2006-03-30
Posted Jan 5, 2007
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Business Objects Crystal Reports XI Professional, which could be exploited by an attacker in order to execute arbitrary code on an affected system. The .RPT files in this rar archive will exploit this flaw.

tags | exploit, arbitrary
SHA-256 | b2628f26b5d5d640b913b6bf61d6a88ece91a99804daad68d8a40f45262b3e21
LSsec Security Advisory 2006-03-30
Posted Jan 5, 2007
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Business Objects Crystal Reports XI Professional, which could be exploited by an attacker in order to execute arbitrary code on an affected system. Exploitation requires that the attacker coerce the target user into opening a malicious .RPT file.

tags | advisory, arbitrary
SHA-256 | b60d07038722c84c868d56facaf9dfa75398e13fd0da14db0fa1dec5ca665f76
LSsec Security Advisory 2006-03-30
Posted Nov 22, 2006
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup version 11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system.

tags | advisory, arbitrary
SHA-256 | 2dcef1d88b90b8926cc40a7227cab7456d72102e182bcbd7fcb6e0346da13648
LSsec Security Advisory 2006-03-30
Posted Oct 12, 2006
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Message Engine (msgeng.exe) due to incorrect handling of RPC requests on TCP port 6503. The interface is identified by dc246bf0-7a7a-11ce-9f88-00805fe43838. Opnum 45 specifies the vulnerable operation within this interface.

tags | advisory, arbitrary, tcp
SHA-256 | 786dcb0aab2a7b5332e94432d40f3d7b873a2f0020678462fb2d59c95f65a2d7
LSsec Security Advisory 2006-03-30
Posted Oct 12, 2006
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Message Engine (msgeng.exe) due to incorrect handling of RPC requests on TCP port 6503. The interface is identified by c246bf0-7a7a-11ce-9f88-00805fe43838. Opnum 43 specifies the vulnerable operation within this interface.

tags | advisory, arbitrary, tcp
SHA-256 | bac777a2b617f5455ff0ea89400e1c5c70d728edb4255664ef723b36c1150731
LSsec Security Advisory 2006-03-30
Posted Oct 12, 2006
Authored by LSsec | Site lssec.com

LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Discovery Service (casdscsvc.exe) due to incorrect handling of requests on TCP port 41523.

tags | advisory, arbitrary, tcp
SHA-256 | 5180f52c40007d64da06cf7ac9ed35d52281f0f71feab512634cc924c1abacd5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close