Exploit the possiblities
Showing 1 - 25 of 33 RSS Feed

Files Date: 2010-08-24

Zero Day Initiative Advisory 10-159
Posted Aug 24, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-159 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed .wk3 document. The application will trust a length specified in the file in order to read a number of bytes into a statically allocated buffer. This leads to a buffer overflow and can lead to code execution under the context of the application.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | f9a5eb0d6854fc03cdc0df0af60c759c
Zero Day Initiative Advisory 10-158
Posted Aug 24, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-158 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed .wk3 document. The application will mistrust a length used to allocate a buffer. Later, the application will use a differently calculated length in a copy used to initialize that buffer. This leads to a buffer overflow and can lead to code execution under the context of the application.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 0d21aefa7e56b2e4339e4b05cf076402
Mono libgdiplus Image Processing Three Integer Overflows
Posted Aug 24, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered three integer overflow vulnerabilities in libgdiplus for Mono, which can be exploited by malicious people to compromise an application using the library. Version 2.6.7 is affected.

tags | advisory, overflow, vulnerability
advisories | CVE-2010-1526
MD5 | edd8180baf4f75f6b26ee4e642069834
Zero Day Initiative Advisory 10-157
Posted Aug 24, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-157 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a Word document containing a malformed shape. The application will calculate a length incorrectly when using it to copy data into an allocated buffer. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
MD5 | 4c61134644896e50f50af6b60359d893
Zero Day Initiative Advisory 10-156
Posted Aug 24, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-156 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The specific flaw exists within the Lotus Notes file viewer utilizing the KeyView SDK to render a malformed Word document. The application will copy an arbitrarily sized ASCII string representing the font name into a constant sized buffer located on the stack. If large enough this will lead to a buffer overflow and can lead to code execution under the context of the application.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 909ed32dca49e40b0a055c251680e13f
Security Mitigations For Return-Oriented Programming Attacks
Posted Aug 24, 2010
Authored by Piotr Bania

Whitepaper called Security Mitigations for Return-Oriented Programming Attacks.

tags | paper
MD5 | 967014e1fb1bc82e1243c56e2049da5a
Binary Code Modification
Posted Aug 24, 2010
Authored by Celil Unuver

Whitepaper called Binary Code Modification. Written in Turkish.

tags | paper
MD5 | 5bb8b9a2f5e202fafd9435e503a608d2
OpenBlog Code Execution
Posted Aug 24, 2010
Site bkis.com

OpenBlog versions prior to 1.2.1 suffer from bypass authentication, cross site scripting and cross site request forgery.

tags | advisory, xss, csrf
MD5 | bc500af6765d93d13d3b620e8dc42929
Novell iPrint Client Browser PluginGetDriverFile Uninitialized Pointer Remote Code Execution
Posted Aug 24, 2010
Authored by Aaron Portnoy | Site tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the ienipp.ocx ActiveX control with CLSID 36723f97-7aa0-11d4-8919-FF2D71D0D32C. The function exposes a GetDriverFile method. When this method is invoked for the first time a pointer in the .data section is mapped to an external function within another module. When invoked the second time, the process fails to load the library and assumes the pointer is still valid. When the uninitialized pointer is called the process jumps to an address space easily controlled by an attacker. This can be leveraged to execute remote code under the context of the user running the browser.

tags | advisory, remote, arbitrary, activex
MD5 | 67de327a8f798bba346bfa99edaa6d2f
Mandriva Linux Security Advisory 2010-159
Posted Aug 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-159 - GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file. This update provides gv 3.7.1, which is not vulnerable to this issue.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2010-2056
MD5 | fc44e2c1112db62901b8748c1f83c665
Cracking Salted Hashes
Posted Aug 24, 2010
Authored by FB1H2S

Whitepaper called Cracking Salted Hashes. The Do's and Don'ts of "Salt Cryptography".

tags | paper
MD5 | 80d89c6a820b99a39d1cc1ee04175763
Password Sniffing In Wireshark
Posted Aug 24, 2010
Authored by rOckHuntEr

Brief whitepaper touching on how to use Wireshark for password sniffing. Written in Arabic.

tags | paper
MD5 | 2efbad8dbe642c492aacac93844e8abb
Debian Linux Security Advisory 2095-1
Posted Aug 24, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2095-1 - Alasdair Kergon discovered that the cluster logical volume manager daemon (clvmd) in lvm2, The Linux Logical Volume Manager, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service.

tags | advisory, denial of service, local
systems | linux, debian
advisories | CVE-2010-2526
MD5 | df971778832e7336a30c996e976bfda9
VWar Cross Site Scripting / SQL Injection / Broken Access Controls
Posted Aug 24, 2010
Authored by Darren McDonald

VWar suffers from cross site scripting, remote SQL injection, broken access controls and weak password generation vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | ebc69cb5ac918e58e9e37d96f8ca6e39
3D FTP Client 9.0 Build 2 Directory Traversal
Posted Aug 24, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

3D FTP Client version 9.0 build 2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | a2d3b7ae21ea21779de1e788391b9399
Microsoft Windows IcmpSendEcho2Ex Denial Of Service
Posted Aug 24, 2010
Authored by l3D

Microsoft Windows IcmpSendEcho2Ex interrupting denial of service exploit.

tags | exploit, denial of service
systems | windows
MD5 | 803c473fe5d91ed0f9c6183017d35700
Abyssal Metal Player 2.0.9 Denial Of Service
Posted Aug 24, 2010
Authored by 41.w4r10r

Abyssal Metal Player version 2.0.9 denial of service exploit that creates a malicious .avi file.

tags | exploit, denial of service
MD5 | d4340a80708e22943d102991b57cb403
Tplayer V1R10 Denial Of Service
Posted Aug 24, 2010
Authored by 41.w4r10r

Tplayer V1R10 denial of service exploit that creates a malicious .mp3 file.

tags | exploit, denial of service
MD5 | 925e9a7353971f14e8cefc787c6e1520
Mandriva Linux Security Advisory 2010-158
Posted Aug 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-158 - functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service by making many IMAP login attempts with different usernames, leading to the creation of many preferences files. This update provides squirrelmail 1.4.21, which is not vulnerable to this issue.

tags | advisory, remote, denial of service, php, imap
systems | linux, mandriva
advisories | CVE-2010-2813
MD5 | 448ed7cf62098bf570f69c0304412867
T-Dreams Announcement Script SQL Injection
Posted Aug 24, 2010
Authored by Br0wn Sug4r

T-Dreams Announcement Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3687a0aee1cfe38d3176cfbba4509fa3
netStartEnterprise 4.0 SQL Injection
Posted Aug 24, 2010
Authored by L1nK

netStartEnterprise version 4.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f26dfeca869e9caefe9ae1861a76895a
Joomla Fabrik SQL Injection
Posted Aug 24, 2010
Authored by Mkr0x

The Joomla Fabrik component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4507765c1cc4ece211f002fd6863fd5f
E107 Cross Site Scripting / Cross Site Request Forgery
Posted Aug 24, 2010
Authored by Justin C. Klein Keane

e107 version 0.7.22 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, csrf
MD5 | 9e57b50fa8474bcf2bc7ab43cde466b5
SDRF Vulnerability In Web Applications And Browsers
Posted Aug 24, 2010
Authored by Vladimir Vorontsov

Whitepaper called SDRF Vulnerability in Web Applications and Browsers. Like the known CSRF (Cross-Site Request Forgery) vulnerability, SDRF falsifies HTTP requests of users, but in contrast to CSRF, it forges the requests, that are send by a user to the same domain, where the malicious code, that exploits the vulnerability, is located.

tags | paper, web, csrf
MD5 | 6b7c2454a20ac71a9688b6782cfc09e6
AutoFTP Manager 4.31 Directory Traversal
Posted Aug 24, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

AutoFTP Manager version 4.31 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 02febac90a00dcb6bfc73fe849834660
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close