exploit the possibilities
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-07-14

Secunia Security Advisory 40610
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun GlassFish Enterprise Server and Java System Application Server, which can be exploited by malicious, local users to manipulate or disclose certain data.

tags | advisory, java, local
MD5 | 652a2182a6b776ba85d3411b5f0144a3
Secunia Security Advisory 40602
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Sun Solaris, which can be exploited by malicious, local users to manipulate or disclose certain data and cause a DoS (Denial of Service), by malicious users to cause a DoS, and by malicious people to conduct cross-site request forgery attacks, cause a DoS, or to compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, csrf
systems | solaris
MD5 | 1cc5167aa06e402f8b70cbc81e525d08
Secunia Security Advisory 40557
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for qt. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 06fd386ea27e1fc7ff9b889ea745b219
Secunia Security Advisory 40574
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in I2P, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | b38d75e25b6bae5851295a7871128edb
Secunia Security Advisory 40612
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OlyKit eBay Clone Script 2010, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 2aaea44da6868c1ffcf9e9810996a719
Secunia Security Advisory 40613
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Mortgage and Amortization Calculator Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | fa26eeedaf86ac4c51ec2d9b6a946f54
Secunia Security Advisory 40587
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 2daybiz Custom Business Card Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 5f54638d617e3d9a3aa7edd80c18a27b
Secunia Security Advisory 40581
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledge a vulnerability in RealPlayer, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 984a79009f64bd676c6fe0cbbfbe5c91
Secunia Security Advisory 40583
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledge a vulnerability in Sun Solaris, which can be exploited by malicious people to compromise an application using the affected library.

tags | advisory
systems | solaris
MD5 | 30574320e20b5910e25d7332c8ac3b6b
Secunia Security Advisory 40586
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in FreeType, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
MD5 | 06c19c575b03ece45174ee25d98ddf1d
Secunia Security Advisory 40580
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ghostscript. This fixes multiple vulnerabilities which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | d7d3ce53b22f3d7063337557bf874802
Secunia Security Advisory 40589
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Campsite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 9380493f9e5bfff095de03be4b20978b
Zero Day Initiative Advisory 10-125
Posted Jul 14, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-125 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. The specific flaw exists within the solid.exe process which listens by default on TCP port 1315. The code responsible for parsing the first handshake packet does not properly validate the length of the username field. By crafting an overly long value in the request an attacker can exploit this to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
MD5 | b4f83ed5b962026d404a382439f4a61c
Zero Day Initiative Advisory 10-124
Posted Jul 14, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-124 - This vulnerability allows remote attackers to execute arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit these vulnerabilities. The specific flaws exist due to how the application passes CGI parameters to the internal obtool binary running on port 443. Due to improper filtering of user data a specially crafted request could lead to arbitrary commands being executed under the credentials of the service.

tags | advisory, remote, arbitrary, cgi, vulnerability
MD5 | 4cf738d52f154a3f4ad93e9d66c14c75
HP Security Bulletin HPSBOV02539 SSRT090267
Posted Jul 14, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS Auditing. The vulnerability could result in a local disclosure of information or elevation of privilege. In addition, a potential vulnerability has been identified with HP OpenVMS on Itanium platforms. This vulnerability could be exploited locally resulting in a Denial of Service (DoS).

tags | advisory, denial of service, local
MD5 | 0fe0883340f41a0bec1aad617365fff2
WebLogic Plugin HTTP Injection Via Encoded URLs
Posted Jul 14, 2010
Authored by George D. Gal, Timothy D. Morgan | Site vsecurity.com

Virtual Security Research, LLC. Security Advisory - Over the last several years, VSR analysts had observed unusual behavior in multiple WebLogic deployments when certain special characters were URL encoded and appended to URLs. In late April, 2010 VSR began researching this more in depth and found that the issue could allow for HTTP header injection and HTTP request smuggling attacks.

tags | exploit, web
advisories | CVE-2010-2375
MD5 | 9764aaeda5a938776e77b9f8161323a8
Technical Cyber Security Alert 2010-194B
Posted Jul 14, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-194B - A large amount of Oracle products and components are affected by multiple vulnerabilities. The impacts of these vulnerabilities include remote execution of arbitrary code, information disclosure, and denial of service.

tags | advisory, remote, denial of service, arbitrary, vulnerability, info disclosure
MD5 | 2cccab589c3db4d4ad6cfa5f15a62558
ToolTalk rpc.ttdbserverd Database Parser Heap Overflow
Posted Jul 14, 2010
Authored by Rodrigo Rubira Branco

There exists a vulnerability within a function of the ToolTalk database server (rpc.ttdbserverd), which when properly exploited can lead to compromise of the vulnerable system. This vulnerability can be triggered by creating a fake database (.rec file) on the system and calling remote procedure 7 of ToolTalk database server pointing to this database, leading to a heap overflow.

tags | advisory, remote, overflow
MD5 | af99c10f5da75394836296a61008c25d
Secunia Security Advisory 40606
Posted Jul 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java System Web Proxy Server, which can be exploited by malicious people to disclose potentially sensitive information or manipulate certain data.

tags | advisory, java, web
MD5 | 5a8fc4d0217e3df93a7c6453ac132d04
HP Security Bulletin HPSBMA02555 SSRT100064
Posted Jul 14, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP Client Automation Enterprise Infrastructure (Radia). The default configuration allows remote disclosure of information.

tags | advisory, remote
advisories | CVE-2010-1972
MD5 | 019c3052950fd69b830007382efcf37b
Winamp Player FLV Data Processing Multiple Overflows
Posted Jul 14, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered multiple vulnerabilities in Winamp. These issues are caused by integer and buffer overflow errors within the "vp6.w5s" component when parsing malformed Flash Video data, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted FLV file. Versions 5.572 and below are affected.

tags | advisory, overflow, arbitrary, vulnerability
MD5 | bfc3b6b9b10b981e637d2bcccbcc64b2
Oracle Secure Backup Scheduler Service Remote Code Execution
Posted Jul 14, 2010
Authored by Cody Pierce | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Secure Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the parsing of commands sent to the obscheduled.exe service listening by default on TCP port 1026, or 1027. Due to a lack of bounds checking on a specific command sequence the program stack can be overwritten with user controlled data. Successful exploitation can lead to remote system compromise under the SYSTEM credentials.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2010-0898
MD5 | 52dcf2ee7632ebaf6818572daef4ac2a
Arora Browser 0.10.0-1 Denial Of Service
Posted Jul 14, 2010
Authored by D4rk357

Arora Browser version 0.10.0-1 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 3b86c71b3b22933e2d50a73539c8e108
Diferior CMS 8.03 Cross Site Request Forgery
Posted Jul 14, 2010
Authored by 10n1z3d

Diferior CMS version 8.01 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
MD5 | 422f0eb4756000530ca272c6399a4bce
Zero Day Initiative Advisory 10-123
Posted Jul 14, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-123 - This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. The specific flaw exists within the register globals emulation layer which allows attackers to specify values for arbitrary program variables. When specific parameters are specified via the URI it is possible for an attacker to bypass the authentication mechanism and reach functionality otherwise inaccessible without proper credentials. This can be leveraged by remote attackers to trigger what were post-auth vulnerabilities without valid credentials.

tags | advisory, remote, arbitrary, vulnerability
MD5 | 9323dc9a2b88fde9db06f8b5acf5aecd
Page 1 of 3
Back123Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close