what you don't know can hurt you
Showing 1 - 25 of 107 RSS Feed

Files Date: 2008-12-09

EasyMail Active-X Buffer Overflow Exploit
Posted Dec 9, 2008
Authored by shinnai, e.wiZz! | Site shinnai.altervista.org

EasyMail Active-X buffer overflow exploit that makes use of emmailstore.dll version 6.5.0.3.

tags | exploit, overflow, activex
MD5 | e1aaf9c0188f18ce1862e6d6daf7633f
Zero Day Initiative Advisory 08-087
Posted Dec 9, 2008
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 08-087 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer 7 on the Microsoft Vista operating system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists during a WebDAV fetch of a document from a path containing a large number of characters. Mishandling of cached content results in a heap corruption which can be leveraged to execute arbitrary code under the context of the current instance of Internet Explorer.

tags | advisory, arbitrary
advisories | CVE-2008-4259
MD5 | 751589968ba467935c7c903bf7b64f5c
Zero Day Initiative Advisory 08-086
Posted Dec 9, 2008
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 08-086 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. Exploitation requires that the attacker coerce the target into opening a malicious .DOC file. The specific flaw exists when processing a malformed table property within a Microsoft Word document. User-supplied data is copied into a stack-based buffer using a size that is calculated from the contents of the property. Exploitation can result in arbitrary code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2008-4837
MD5 | 7173fbd2fcf212ee1ad55ac6699afa8e
Zero Day Initiative Advisory 08-085
Posted Dec 9, 2008
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 08-085 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of various Microsoft products including Word, Outlook and WordPad. User interaction is required to exploit this vulnerability in that the target must visit a malicious page, open a malicious e-mail, or open a malicious file. The specific flaw exists within the parsing of RTF documents containing multiple drawing object tags. First, code within wwlib.dll allocates a buffer for the tag object. Later, a result from a call into mso.dll is copied into the same buffer but with a larger size than was allocated by the callee. Successful exploitation can lead to remote compromise of a system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2008-4028
MD5 | d42d4787fa99cd4125a11c8bbd9a50d1
Zero Day Initiative Advisory 08-084
Posted Dec 9, 2008
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 08-084 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page, open a malicious e-mail, or open a malicious file. The specific flaw exists when parsing malformed RTF documents. When processing consecutive "\\do" Drawing Object tags mso.dll does not properly verify the integrity of the object and frees a memory buffer twice, leading to heap corruption. Successful exploitation can lead to remote compromise of a system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2008-4027
MD5 | 6552d4188968d41b5cac34340ff02314
Zero Day Initiative Advisory 08-083
Posted Dec 9, 2008
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 08-083 - This vulnerability allows remote attackers to execute arbitrary code through vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the Microsoft Animation ActiveX control MSCOMCT2.OCX. When parsing a malformed AVI file through this control an exploitable heap corruption can occur. As the AVI file can be loaded over a UNC path this issue is remotely exploitable and can result in arbitrary code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution, activex
advisories | CVE-2008-4255
MD5 | 0359f53a719a0ca89510a733ace360bf
Microsoft Hierarchical FlexGrid Control Integer Overflows
Posted Dec 9, 2008
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered some vulnerabilities in Microsoft Hierarchical FlexGrid Control bundled with various products, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to integer overflow errors in the ActiveX control (mshflxgd.ocx) when handling the "Rows" and "Cols" properties and the "ExpandAll()" and "CollapseAll()" methods. These can be exploited to corrupt memory. Successful exploitation allows execution of arbitrary code. Microsoft Hierarchical FlexGrid Control 6.0.88.4 is affected.

tags | advisory, overflow, arbitrary, vulnerability, activex
advisories | CVE-2008-4254
MD5 | e64fb150bab1c8c4ee5d693344cfd190
iDEFENSE Security Advisory 2008-12-09.2
Posted Dec 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.09.08 - Remote exploitation of an integer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed that gdi32.dll file version 5.1.2600.3316, as included in fully patched Windows XP Service Pack 2 as of May 2008, is vulnerable. Other versions of Windows are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | windows, xp
advisories | CVE-2008-2249
MD5 | 89a2abf7e0b1eaeaa9be280cb2c53ca1
iDEFENSE Security Advisory 2008-12-09.1
Posted Dec 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.09.08 -Remote exploitation of a stack buffer overflow vulnerability while handling specific HTML tags in Microsoft Corp.'s Internet Explorer web browser allows attackers to execute arbitrary code within the context of the affected user. As of September 2008, iDefense confirms that Internet Explorer 5.01 on Windows 2000 SP4, is vulnerable. It also causes denial of service for Internet Explorer 6 on Windows XP SP2. Internet Explorer 7 is not affected.

tags | advisory, remote, web, denial of service, overflow, arbitrary
systems | windows, 2k, xp
advisories | CVE-2008-4261
MD5 | 2956b1b60e972579f6a902e888029a33
sh3llc0der.c
Posted Dec 9, 2008
Authored by sm4x

ELF binary shellcode encryptor that is NULL free for IDS payload bypassing.

tags | shellcode
MD5 | 77e9bcfc0204bb20a04e77d48f89e3db
PHP Multiple Newsletters 2.7 LFI / XSS
Posted Dec 9, 2008
Authored by ahmadbady

PHP Multiple Newsletters version 2.7 suffers from local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, php, vulnerability, xss, file inclusion
MD5 | bc8dc18691d926a46896b233e9d7f290
PHPmyGallery 1.5beta LFI / RFI Vulnerabilities
Posted Dec 9, 2008
Authored by CoBRa_21 | Site ipbul.org

PHPmyGallery version 1.5beta suffers from local and remote file inclusion vulnerabilities in common-tpl-vars.php.

tags | exploit, remote, local, php, vulnerability, code execution, file inclusion
MD5 | 98a9fa620714a2e37e1e12d4f2054b9d
PostEcards SQL Injection / Database Disclosure
Posted Dec 9, 2008
Authored by AlpHaNiX | Site offensivetrack.org

PostEcards suffers from remote SQL injection and database disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
MD5 | 543aa380d1cca312a4ee7b57d97d1e26
ProQuiz 1.0 SQL Injection
Posted Dec 9, 2008
Authored by Osirys

ProQuiz version 1.0 suffers from a SQL injection vulnerability that allows for authentication bypass.

tags | exploit, sql injection
MD5 | bbd3d905d211b52e25eb9a94447f72cb
Core Security Technologies Advisory 2008.1127
Posted Dec 9, 2008
Authored by Core Security Technologies, Alfredo Ortega | Site coresecurity.com

Core Security Technologies Advisory - Vinagre is a VNC client for the GNOME Desktop. A format string error has been found on the 'vinagre_utils_show_error()' function that can be exploited via commands issued from a malicious server containing format string specifiers on the VNC name. In a web based attack scenario, the user would be required to connect to a malicious server. Successful exploitation would then allow the attacker to execute arbitrary code with the privileges of the Vinagre user. Proof of concept code included.Versions 2.24.1 and below are affected.

tags | exploit, web, arbitrary, proof of concept
MD5 | 283543f20948ec3d0633251b9ba6ce8e
Microsoft Excel NAME Record Array Indexing Vulnerability
Posted Dec 9, 2008
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Excel, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to insufficient validation of an index value in the NAME record and can be exploited to corrupt memory via a specially crafted Excel Spreadsheet (XLS) file. Successful exploitation may allow execution of arbitrary code. Microsoft Office Excel 2000 SP3 and Microsoft Office Excel 2002 SP3 are affected.

tags | advisory, arbitrary
advisories | CVE-2008-4266
MD5 | 447e3e573e63a79aee7c4d73b5687528
Microsoft Word RTF Polyline/Polygon Integer Overflow
Posted Dec 9, 2008
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office Word, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an integer overflow error when calculating the space required for the specified number of points in a polyline or polygon. This can be exploited to cause a heap-based buffer overflow during parsing of objects in Rich Text Format (.rtf) files e.g. when a user opens a specially crafted .rtf file with Word or previews a specially crafted e-mail. Successful exploitation may allow execution of arbitrary code. Microsoft Office Word 2003 SP3 and Microsoft Office Word Viewer 2003 SP3 are affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2008-4025
MD5 | 35eccab72e737417ffc6a624c677ab30
.Aware Call For Papers
Posted Dec 9, 2008
Authored by the .aware crew | Site awarenetwork.org

The .Aware-Electrolicious-Zine Call For Paper for the Delta Edition has been announced. It will be released on the 1st of April, 2009.

tags | paper, conference
MD5 | e35237f19a0887e0cf4f9c5da31d7471
SEC Consult Security Advisory SA-20081109-0
Posted Dec 9, 2008
Authored by Bernhard Mueller | Site sec-consult.com

SEC Consult Security Advisory 20081209-0 - Microsoft SQL Server suffers from a limited memory overwrite vulnerability.By calling the extended stored procedure sp_replwritetovarbin, and supplying several uninitialized variables as parameters, it is possible to trigger a memory write to a controlled location. Depending on the underlying Windows version, it is / may be possible to use this vulnerability to execute arbitrary code in the context of the vulnerable SQL server process. In a default configuration, the sp_replwritetovarbin stored procedure is accessible by anyone. The vulnerability can be exploited by an authenticated user with a direct database connection, or via SQL injection in a vulnerable web application. Versions 8.00.2039 and below are affected.

tags | advisory, web, arbitrary, sql injection
systems | windows
MD5 | 40dcb1354e0bf37319f474c7057b717d
Netref 4.0 SQL Injection
Posted Dec 9, 2008
Authored by SuB-ZeRo

Netref version 4.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 0691f762d11f11205de53517e464cb0e
Peel Shopping 3.1 SQL Injection
Posted Dec 9, 2008
Authored by SuB-ZeRo

Peel Shopping version 3.1 suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
MD5 | 428a45f12ce7f4fbbea4262dc1341890
Secunia Security Advisory 33061
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for streamripper. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 5bba1e074a0ba4f368591c782d7171b8
Secunia Security Advisory 33057
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Aruba Mobility Controller, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | c9e2b3014721d525a4a347afcc5b3946
Secunia Security Advisory 33060
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chris Castaldo has discovered some vulnerabilities in 3CX Phone System, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | bd9b4e8ff93baf45231eb51b12d2da90
Secunia Security Advisory 33028
Posted Dec 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in HP DECnet-Plus for OpenVMS, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
MD5 | 0c72a4b210443608397f8ada72c97eae
Page 1 of 5
Back12345Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close