exploit the possibilities
Showing 1 - 22 of 22 RSS Feed

Files Date: 2010-10-25

Sun Java Runtime New Plugin docbase Buffer Overflow
Posted Oct 25, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a flaw in the new plugin component of the Sun Java Runtime Environment before v6 Update 22. By specifying specific parameters to the new plugin, an attacker can cause a stack-based buffer overflow and execute arbitrary code. When the new plugin is invoked with a "launchjnlp" parameter, it will copy the contents of the "docbase" parameter to a stack-buffer using the "sprintf" function. A string of 396 bytes is enough to overflow the 256 byte stack buffer and overwrite some local variables as well as the saved return address. NOTE: The string being copied is first passed through the "WideCharToMultiByte". Due to this, only characters which have a valid localized multibyte representation are allowed. Invalid characters will be replaced with question marks ('?'). This vulnerability was originally discovered independently by both Stephen Fewer and Berend Jan Wever (SkyLined). Although exhaustive testing hasn't been done, all versions since version 6 Update 10 are believed to be affected by this vulnerability. This vulnerability was patched as part of the October 2010 Oracle Patch release.

tags | exploit, java, overflow, arbitrary, local
advisories | CVE-2010-3552
SHA-256 | dfbadc6979afc5d422243d430c6c8f9d84ede4aee2963020fcf6c4c80f0ba887
Adobe Shockwave rcsL Memory Corruption
Posted Oct 25, 2010
Authored by David Kennedy | Site metasploit.com

This Metasploit module exploits a weakness in the Adobe Shockwave player's handling of Director movies (.DIR). A memory corruption vulnerability occurs through an undocumented rcsL chunk. This vulnerability was discovered by http://www.abysssec.com.

tags | exploit, web
advisories | CVE-2010-3653
SHA-256 | edbfcc271f52640c5283e776893d943627be757790c777c863e113627287a4e1
Oracle VM Server Virtual Server Agent Command Injection
Posted Oct 25, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a command injection flaw within Oracle\\'s VM Server Virtual Server Agent (ovs-agent) service. By including shell meta characters within the second parameter to the 'utl_test_url' XML-RPC methodCall, an attacker can execute arbitrary commands. The service typically runs with root privileges. NOTE: Valid credentials are required to trigger this vulnerable. The username appears to be hardcoded as 'oracle', but the password is set by the administrator at installation time.

tags | exploit, arbitrary, shell, root
advisories | CVE-2010-3585
SHA-256 | a344bd54fa4c477119c5044e88885c1a910d29d6cdf06faf3ada865aec5793cd
IPv6 Security Assessment Paper
Posted Oct 25, 2010
Authored by Fernando Gont

Results of a Security Assessment of the Internet Protocol version 6 (IPv6). These are the presentation slides that were used at LACNOG.

tags | paper, protocol
SHA-256 | 0af0fdd608e434d3e0a046b6dc8e603642e17c307867c7b1add93abca814318d
MinaliC Webserver 1.0 Denial Of Service
Posted Oct 25, 2010
Authored by AutoSec Tools

MinaliC Webserver version 1.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3ab3f9b4f8db837e41c853797142e2f7df8a77688a4ae396d0ae8f66b544545a
MinaliC Webserver 1.0 Directory Traversal
Posted Oct 25, 2010
Authored by AutoSec Tools

MinaliC Webserver version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | ead72a6bb8f230f533f692b2b034a67c99dc4c2679e9d63e5f3f4ccf08d8e869
HP Data Protector Media Operations 6.11 Denial Of Service
Posted Oct 25, 2010
Authored by d0lc3

HP Data Protector Media Operations version 6.11 HTTP server remote integer overflow denial of service exploit.

tags | exploit, remote, web, denial of service, overflow
SHA-256 | 4d3d1965bea2dedd57e80ca25e0124e7fe28ea8e1822d292ae5429b5ad45ae92
Jamb Cross Site Request Forgery
Posted Oct 25, 2010
Authored by stoke

Jamb suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f4c0b06d34c2f29e607cd3f02c3d0247b8f9d62f546671e4cb971efa0f224a3b
Secunia Security Advisory 41960
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in monotone, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 9d9b6ed09b719edb988bd8e9bccf5bb6a43a7105f39a02f24c5a58f5fa2502a6
Secunia Security Advisory 41980
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Moodle, which can be exploited by malicious users to perform certain actions with escalated privileges, hijack another user's session, and disclose sensitive information and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | b9cbec8893c16ceae6076650f4ecbea510674b8f2b043ef3473adcbf3137ceda
Secunia Security Advisory 41991
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in AutoPlay Media Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | e25c89aef1c90cc24e5621da5158bd4bc9eb26e796eef36172644b3a3867c725
Secunia Security Advisory 41954
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the phpMyAdmin module for Moodle, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 3553d202364561ca10a7821cf39d238b3bff7207437b5df6d3a7e88a7e16df41
Secunia Security Advisory 41988
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Wondershare Flash Gallery Factory, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 44ada75de91ebc66baa86f96eb990b3175b562fb96ca4ef14278197d537f20a9
Secunia Security Advisory 41941
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for glibc. This fixes two weaknesses, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | f973e9e863fed5fa74407af76b6ceb6cd7bb3a49d0d899ce83c1e3b8f04a6962
Secunia Security Advisory 41940
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for glibc. This fixes two weaknesses, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 4011ef5daec61793dc7ab6b07a6fc59133284c3c6d980327b4384eac22d58d87
Secunia Security Advisory 41971
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for glibc. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 79782c5dc9aa662d0bb98de097a487ebc890569b811796af658269e527b750e5
Secunia Security Advisory 41990
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ProShow Producer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1b042ea8852b553329c0086dce24539fea26aae503311276b6c4622debf04626
Secunia Security Advisory 41934
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in pecio cms, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 9325f39c3e4635aeb47f923445cb6d05eae0b13b9f6f3f449038dd2762a828fb
Secunia Security Advisory 41932
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Shockwave Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f33d8a0f6dbbc785ff76368bda33b35d20fca1f803ca6c80e8a19c688cf2c936
Secunia Security Advisory 41948
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - J. Greil has discovered a vulnerability in Sawmill, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 72589a8f167c9a5a1d066d3048cf533824758b0e101dbd6104fbfcdc45431f49
Secunia Security Advisory 41899
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pidgin. This fixes multiple weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 8bb10f737aff61e9991891d172ebca0134acb04f186199d570ba23d95b51ebca
Secunia Security Advisory 41942
Posted Oct 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libvirt and virtinst. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious, local users in a guest system to bypass certain security restrictions.

tags | advisory, local, vulnerability
systems | linux, ubuntu
SHA-256 | fbfecbf82c4b4611620443dd2f937b64e222b490af9853ed8f0e3b227346994b
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close