exploit the possibilities
Showing 1 - 25 of 34 RSS Feed

Files Date: 2010-03-05

iDEFENSE Security Advisory 2010-03-04.1
Posted Mar 5, 2010
Authored by iDefense Labs, Joshua J. Drake | Site idefense.com

iDefense Security Advisory 03.04.10 - Remote exploitation of an integer overflow vulnerability in Autonomy's KeyView Filter SDK allows attackers to execute arbitrary code with the privileges of the targeted application. This vulnerability occurs when processing specially crafted documents. When processing such a document, the software reads an integer value from the file and uses this integer, without validation, in an arithmetic operation to calculate the amount of memory to allocate. If a sufficiently large number is supplied, the calculation overflows, resulting in a buffer of insufficient size being allocated. The software then proceeds to copy data into this under-sized buffer. This results in an exploitable heap buffer overflow condition.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-3032
MD5 | 02061082038dac3eab8518904cc3a6a6
Sagem Routers Remote Authentication Bypass
Posted Mar 5, 2010
Authored by AlpHaNiX

Sagem Routers remote authentication bypass exploit.

tags | exploit, remote, bypass
MD5 | bac2c30e66184f69815b795874698102
Natychmiast CMS Cross Site Scripting / SQL Injection
Posted Mar 5, 2010
Authored by Ariko-Security

Natychmiast CMS suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 7af740763827517f4b3c5272607bf54f
BS.Player 2.51 Build 1022 Buffer Overflow
Posted Mar 5, 2010
Authored by LiquidWorm

BS.Player version 2.51 build 1022 (Media Library) suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
MD5 | db8e6e9a787fd586eb5a106e6dbfb0f8
VLC Media Player 1.0.5 Goldeneye Buffer Overflow
Posted Mar 5, 2010
Authored by LiquidWorm

VLC Media Player version 1.0.5 Goldeneye suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
MD5 | a86824aea954354508bf9ecfd6099526
J. River Media Jukebox 12 Heap Overflow
Posted Mar 5, 2010
Authored by LiquidWorm

J. River Media Jukebox 12 suffers from a MP3 file handling remote heap overflow vulnerability.

tags | advisory, remote, overflow
MD5 | 4ef3d7f8666627eda39eb3258ecd945a
PHP Auctions Cross Site Scripting
Posted Mar 5, 2010
Authored by SENOT

PHP Auctions suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
MD5 | 2e0bbefac939f67a58b7fa0b012edf58
Orb DirectShow Denial Of Service
Posted Mar 5, 2010
Authored by Matthew Bergin

Orb versions 2.0.01.0049 through 2.54.0018 DirectShow filter integer division by zero denial of service exploit.

tags | exploit, denial of service
MD5 | e3c4263004650f6cda83215ac3044a7b
PHP-Nuke CMS SQL Injection
Posted Mar 5, 2010
Authored by SENOT

The survey and poll modules of PHP-Nuke CMS suffer from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
MD5 | cddd6be8402c979ac8f9e581d1e98fbb
Authentium Command Free Scan Proof Of Concept
Posted Mar 5, 2010
Authored by Nikolas Sotiriu

Proof of concept exploit that demonstrates a buffer overflow in the Authentium Command On Demand Online scanner service.

tags | exploit, overflow, proof of concept
MD5 | 92398056d32ddcda9d3b045edb319371
Authentium Command Free Scan ActiveX Control Buffer Overflow
Posted Mar 5, 2010
Authored by Nikolas Sotiriu

Remote exploitation of a buffer overflow vulnerability in Authentium Command On Demand Online scanner service could allow an attacker to execute arbitrary code within the security context of the targeted user.

tags | advisory, remote, overflow, arbitrary
MD5 | 3ce799d522b4cfb1294d7eca4e2dfb2a
ONECMS 2.5 SQL Injection
Posted Mar 5, 2010
Authored by Ctacok, melkiy

ONECMS version 2.5 remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 41458d1fc8b5e4498f4a4964d693cb3f
Kolang Safe Mode Bypass PHP Code
Posted Mar 5, 2010
Authored by Hamid Ebadi | Site bugtraq.ir

Kolang is a php script that can be leveraged in local and remote file inclusion attacks and performs safe mode bypass for PHP versions 4.3.10 through 5.3.10.

tags | tool, remote, local, php, rootkit, bypass, file inclusion
systems | unix
MD5 | 4449148c994431c93d38cfade8f237bd
Pre E-Learning Portal SQL Injection
Posted Mar 5, 2010
Authored by NoGe

Pre E-Learning Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | d69dc3935f111b0791171b0ce18e55b5
64 Bytes modsecurity Disabling Shellcode
Posted Mar 5, 2010
Authored by sekfault

64 bytes small Linux/x86 disable modsecurity shellcode.

tags | x86, shellcode
systems | linux
MD5 | 3f86c54e6e7020228a2c9105236f14ac
Joomla Blog Local File Inclusion
Posted Mar 5, 2010
Authored by DevilZ TM

The Joomla Blog component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | cdfbab66139a980757ff3c8c2285c729
BBSXP 2008 Cross Site Scripting
Posted Mar 5, 2010
Authored by Liscker

BBSXP 2008 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2e2fc5a0942f7afe4f6295fb77e5cdce
Joomla Remote File Inclusion Paper
Posted Mar 5, 2010
Authored by Mr.aFiR | Site aFiR.me

This paper documents approximately 50 remote file inclusion vulnerabilities in Joomla and related components.

tags | paper, remote, vulnerability, code execution, file inclusion
MD5 | a71eb0e56b52798dc503b01f5d324e27
fcrontab Information Disclosure
Posted Mar 5, 2010
Authored by Dan Rosenberg

fcrontab, part of the fcron scheduler, is vulnerable to several race conditions that allow a local attacker to use symbolic links to read unauthorized files.  Versions before 3.0.5 are affected.

tags | advisory, local
advisories | CVE-2010-0792
MD5 | ee1afe06e1fc4171975ed438e0aabf5e
Secunia Security Advisory 38844
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in CSS Web Installer ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web, vulnerability, activex
MD5 | c1ed0f11253b0a3e624b97617eefd93a
Secunia Security Advisory 38855
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - liscker has discovered a vulnerability in BBSXP, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 2c3839c5d4244cc0e0889246c2b4f812
Secunia Security Advisory 38853
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 6ea0db645434ff53d31838093ba681c0
Secunia Security Advisory 38857
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in OpenPNE, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | a72e2370e301bfe12d958173a419b9b3
Secunia Security Advisory 38824
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Unified Communications Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
MD5 | 456c857f73a43a8b6b51e2e370bdee48
Secunia Security Advisory 38818
Posted Mar 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the AddThis Button module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | cc033b3fb42e60a5bb2e7ea0f4078316
Page 1 of 2
Back12Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close