exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Secunia Research

Email addressvuln at secunia.com
First Active2005-09-20
Last Active2011-11-13
Support Incident Tracker 3.65 Remote Command Execution
Posted Nov 13, 2011
Authored by Secunia Research, juan vazquez | Site metasploit.com

This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.

tags | exploit, arbitrary, shell, php, vulnerability, file upload
advisories | CVE-2011-3829, CVE-2011-3833, OSVDB-76999, OSVDB-77003
SHA-256 | dbc7a2ae369700f4243579f8576c1fb42786b65ea5a9ec60c838072b7d4ea678
secunia-htmsr.txt
Posted Apr 14, 2008
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in Lotus Notes, which can be exploited by malicious people to compromise a user's system. A boundary error within the HTML speed reader (htmsr.dll) when handling links in e.g. the "background" attribute of BODY tags can be exploited to cause a stack-based buffer overflow. A boundary error within the HTML speed reader (htmsr.dll) when handling e.g. the "src" attribute of IMG tags can be exploited to cause a stack-based buffer overflow. A boundary error within the HTML speed reader (htmsr.dll) when handling large chunks of data inside an HTML document can be exploited to cause a heap-based buffer overflow. Lotus Notes version 7.0.2 and 7.0.3 are affected.

tags | advisory, overflow, vulnerability
advisories | CVE-2008-0066
SHA-256 | 4ef2c4b7110f3d7524e338fb87a79eae6cb65d96ff1cff9753bfb48edd809bb6
secunia-lotusnotes.txt
Posted Apr 14, 2008
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which can be exploited by malicious people to compromise a user's system. A boundary error within kvdocve.dll when processing overly long paths can be exploited to cause a buffer overflow via e.g. an overly long link inside the "src" attribute of an <IMG> tag in an HTML document. Lotus Notes versions 7.0.2 and 7.0.3 are affected.

tags | advisory, overflow
advisories | CVE-2008-1101
SHA-256 | ab50855d74e97eceb35e317b095d063f7955075bc8d82e7c523e3f1deb4a3d78
Secunia-tbird.txt
Posted Jan 22, 2006
Authored by Secunia Research | Site secunia.com

Secunia Research 17/01/2006 - Secunia Research has discovered a vulnerability in Thunderbird, which can be exploited by malicious people to trick users into executing arbitrary programs.

tags | advisory, arbitrary
SHA-256 | 3a68f9dd70465c25eb8e928688ffc045f8dd3474c75161d15f88b7b965515fe6
secunia-IceWarp.txt
Posted Dec 29, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in IceWarp Web Mail, which can be exploited by malicious users and by malicious people to disclose potentially sensitive information and to compromise a vulnerable system.

tags | advisory, web, vulnerability
SHA-256 | 468316ce679c99742ba111c55cf9768dfd3f23c467d4ee76c196fe6c831eb720
secunia-Pegasus.txt
Posted Dec 28, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered two vulnerabilities in Pegasus Mail, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 54e7c14fe91c09b67b14fa60339a95d0b7b5c1159ce1efb8851f646535e36e5b
Secunia-ZipGenius.txt
Posted Oct 24, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in ZipGenius, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | a06892cdcbe59aadbc48aa8c3d57e8c8c48c363ab4ec3944cd3e4f1b59bd74f9
Secunia-MySource.txt
Posted Oct 24, 2005
Authored by Secunia Research | Site secunia.com

Secunia Research has discovered some vulnerabilities in MySource, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | b20aff27f2ff5fe5e74059ae65e4aa37d5e08883f20daf849c01042b8b016dc5
secunia-netmail-3.52C
Posted Oct 13, 2005
Authored by Secunia Research | Site secunia.com

Secunia research has discovered a vulnerability in Novell NetMail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 216a4b9cd6b475818d0fb2dad4209215db856a48bff8ed34e60241ff5c088664
secunia-Ahnlab.txt
Posted Sep 20, 2005
Authored by Secunia Research | Site secunia.com

Ahnlab V3 Antivirus suffers from multiple vulnerabilities including privilege escalation and security bypass.

tags | advisory, vulnerability
SHA-256 | 2ae763edf25b4f62ff2f3ef50c76412d6dae1da0517c6a1e8125b2eeb7569a1b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close