exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 128 RSS Feed

Files Date: 2010-08-26

Secunia Security Advisory 41162
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Mihalism Multi Host, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 59c5602dd7e17c5387218c43b8723c802115d417c798c8dec3905e91c29f166c
Secunia Security Advisory 41131
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IZArc, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 55bf8dfb47730edd08a8e37db54b826d2d7ff04ea227db615e8e23a3a11613ba
Secunia Security Advisory 41125
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Packet Tracer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | cisco
SHA-256 | 1878231cbf97dfd7bb144f77d2441b84b09ce1208f54f69bea9a84248d7720eb
Secunia Security Advisory 41137
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Roxio Media Creator, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9f4e57aed5f4cd78f4b9061958c9989fadf3a9cc363f2e4cc9309bafca5050bc
Secunia Security Advisory 41103
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in PKZIP, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 925f1eab18cc78e5425b6e2469aaecbe8653f77fff3fe26e4db1daca1a1d2ab4
Secunia Security Advisory 41147
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eskarina Smith has discovered a vulnerability in Auto CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 30bd0e40b39d15569c741461140f2ccddd74e046bcb9ad0c45c2d7479519868c
Secunia Security Advisory 41127
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Webmatic, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 611f5b1675f113f3b604940df5d0956e641babf96b3d1f8e78d1414049b7dfef
Secunia Security Advisory 41116
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered some vulnerabilities in Target CMS, which can be exploited by malicious user to conduct script insertion attacks, SQL injection attacks, and disclose sensitive information and by malicious people to conduct cross-site scripting attacks, SQL injection attacks, and disclose sensitive information.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ddfec899b1ab1c50035314d560df9740f497f8e8be528d6f1b136dffbc4dcead
Secunia Security Advisory 41168
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 0d00c1b4e675c7bd4b30d074129ba67d2f1b86dc46ab68cc539ea4b959a1cc55
Secunia Security Advisory 41100
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco Unified Communications Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | ee65adfc9275f91ab1b1732ee32ef40a5402278daf6d470422f65ba26e850748
Ubuntu Security Notice 977-1
Posted Aug 26, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 977-1 - It was discovered that MoinMoin did not properly sanitize its input, resulting in cross-site scripting (XSS) vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.

tags | advisory, remote, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2010-2487, CVE-2010-2969, CVE-2010-2970
SHA-256 | f538172b30fc98a58580052fdd4fd67f69c60186f5886f382b323b4806770858
Cisco Security Advisory 20100825-cucm
Posted Aug 26, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
advisories | CVE-2010-2837, CVE-2010-2838
SHA-256 | a2d98d925e13eeb5d472669ec7bf4946d776200c5a12e9cda576c4f23cb8884b
Cisco Security Advisory 20100825-cup
Posted Aug 26, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified Presence contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of presence services. suffers from a denial of service vulnerability.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
advisories | CVE-2010-2839, CVE-2010-2840
SHA-256 | fd10881632bee7f401d9c0d239da6fd842c0cb2063228aef9d9abbf7cd795342
Google Earth 5.1.3535.3218 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Google Earth version 5.1.3535.3218 DLL hijacking exploit that leverages quserex.dll.

tags | exploit
SHA-256 | 8269c17266ece92c5ebee258170f27e2afc30fbeda782866d4eba29a1241b3be
Nullsoft Winamp 5.581 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Nullsoft Winamp version 5.581 DLL hijacking exploit that leverages wnaspi32.dll.

tags | exploit
SHA-256 | 4d95a031560cb1a18e6c908c0decf1141e2f7ed0b36e6a081ddfed39de031cb2
Microsoft Office PowerPoint 2007 12.0.4518 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Microsoft Office PowerPoint 2007 version 12.0.4518 DLL hijacking exploit that leverages pp4x322.dll.

tags | exploit
SHA-256 | 659757bcae543efbf80e8f8f6f717651711f63ea94892914845ab4013c3f0853
Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the DIRAPIX module responsible for parsing the RIFF-based Director file format. When handling the mmap chunk, the process trusts the chunk size immediately following the fourCC value. It is passed to Ordinal1111 exported by the IML32X module which is responsible for allocating a heap buffer for processing the rest of the chunk. If an incorrect size is provided, later memory copies can corrupt data beyond the allocated buffer. This can be abused to execute remote code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2010-2870
SHA-256 | 81e8ba67b1a1a3b42dc58319b1e12d7d52164ce3c75ee9898b373eeafb8c25bb
GFI WebMonitor Script Code Injection
Posted Aug 26, 2010
Authored by Oliver Karow | Site oliverkarow.de

The GFI WebMonitor administrative interface suffers from a remote script code injection vulnerability.

tags | advisory, remote
SHA-256 | e759d7240347b5d2e90c6c08c5d87afae48474ff41901286e4df0ca8ca2ec635
Secunia Security Advisory 41159
Posted Aug 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SSSD, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6b13df3817c7e6eed732be0ad89e03cbca6deceb0ab05cc1c6a3f4247b50b684
eSitesBuilder Cross Site Scripting / Path Disclosure / SQL Injection
Posted Aug 26, 2010
Authored by MustLive

eSitesBuilder suffers from cross site scripting, path disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9ddb9f8ee3dbfbca251be71bd7f8cd3c8174dd85d260f70d2cf5549fe3d5b859
Media Player Classic 6.4.9.1 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Media Player Classic version 6.4.9.1 DLL hijacking exploit that leverages iacenc.dll.

tags | exploit
SHA-256 | 6d9a6980de12fdd13d47ce9d5c352dd814f744329403ea133224351f75adab74
CVE Checker 0.4
Posted Aug 26, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release includes internal project files reorganization (more to the liking of the GNU autoconf/automake standards), fixes a database leak bug, and introduces a slightly more intelligent pullcves command (with multiple return code behavior to improve automation efforts). All documentation has been updated, and a pullcves manual page has been added.
tags | vulnerability
systems | unix
SHA-256 | 5d43fb948d296ce79943d6b84634a90f68d6a566816163a8756bd4f272f9b566
Ubuntu Security Notice 976-1
Posted Aug 26, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 976-1 - It was discovered that Tomcat incorrectly handled invalid Transfer-Encoding headers. A remote attacker could send specially crafted requests containing invalid headers to the server and cause a denial of service, or possibly obtain sensitive information from other requests.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-2227
SHA-256 | c49a0ef250ba4b756e90aad4b96a7cf91f66b6d92e371674186a3b60746823f0
Corel PHOTO-PAINT X3 13.0.0.576 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Corel PHOTO-PAINT X3 version 13.0.0.576 DLL hijacking exploit that leverages crlrib.dll.

tags | exploit
SHA-256 | 811fda6346ea715a28ba39414e668f74d982441c3b608161752866b780c8f6be
Zero Day Initiative Advisory 10-165
Posted Aug 26, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-165 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Internet Security Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the UfPBCtrl.dll ActiveX control. The extSetOwner function accepts a parameter and assumes it is an initialized pointer. By specifying an invalid address, an attacker can force the process to call into a controlled memory region. This can be exploited to execute remote code under the context of the user invoking the browser.

tags | advisory, remote, arbitrary, activex
SHA-256 | 07b138612875eae7ce6e5d1402d90d0d0a8f23d8d53ab9b3da1751e280f46d7a
Page 1 of 6
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close