exploit the possibilities
Showing 1 - 25 of 39 RSS Feed

Files Date: 2010-11-10

iDEFENSE Security Advisory 2010-11-09.1
Posted Nov 10, 2010
Authored by iDefense Labs, wushi | Site idefense.com

iDefense Security Advisory 11.09.10 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s Word could allow attackers to execute arbitrary code under the privileges of the targeted user. This vulnerability specifically exists in the handling of a specific control word in an RTF document. Under certain circumstances, Word will copy its property strings into a stack buffer without checking the length, which causes a stack buffer overflow. iDefense has confirmed the existence of this vulnerability in Microsoft Word 2003, Microsoft Word 2007, and Microsoft Outlook 2007.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-3333
MD5 | f74a1b43f55ce43ac6756e5a0d440d43
Technical Cyber Security Alert 2010-313A
Posted Nov 10, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-313A - There are multiple vulnerabilities in Microsoft Office, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
MD5 | 6b94118df9c25d402f2efef49d6cb83f
Zero Day Initiative Advisory 10-247
Posted Nov 10, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-247 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability. The specific flaw exists in a function responsible for assembling an HTTP response. The following modules implement this functionality: gwpoa.exe, gwmta.exe, gwia.exe. When responding to an HTTP request sent to TCP port 7101 or 7100 or in the case of gwia.exe the user configured "Message Transfer Port", the process uses the client-specified "Host: " header to create an HTTP 301 redirection message. Within this code a local stack buffer is used to store the redirect location and can be overflown with a sufficiently long header value. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, web, overflow, arbitrary, local, tcp
MD5 | 0da81411f23f599ab6dc5cc879962c3a
Zero Day Initiative Advisory 10-246
Posted Nov 10, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-246 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application frees resources when parsing a malformed Office Art record. Due to the application not properly freeing up resources during handling a parsing error, the application will later access the freed reference which can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-3335
MD5 | f8a1ee9c234354dd609efcdf405cd0dc
Secunia Security Advisory 42144
Posted Nov 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office for Mac, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 121f15ce7d16f899a93e992602a35bd8
Secunia Security Advisory 42131
Posted Nov 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Forefront Unified Access Gateway (UAG), which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.

tags | advisory, spoof, vulnerability, xss
MD5 | 414a48ba58cee7d7cb61cd28292da576
Secunia Security Advisory 42165
Posted Nov 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Free CD to MP3 Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | f2a237b933007266ff1392fc5744a23e
Secunia Security Advisory 42157
Posted Nov 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Flash Media Server (FMS), which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially execute arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
MD5 | 4aedd6dce7068f3f23fb6c23101af551
Zero Day Initiative Advisory 10-245
Posted Nov 10, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-245 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2003. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the application trusting a value defined within a file. This value will have some arithmetic performed on it, and subsequently be used as a counter for a processing loop. By modifying this value, an attacker can reliably corrupt memory. Successful exploitation will lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-2573
MD5 | cb86e1f00c1dfd165024cb71aa45dc0a
Mandriva Linux Security Advisory 2010-225
Posted Nov 10, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-225 - A vulnerability was discovered and corrected in libmbfl (php).

tags | advisory, php
systems | linux, mandriva
advisories | CVE-2010-4156
MD5 | f697938ae275029fad442bf90160a56b
Mandriva Linux Security Advisory 2010-224
Posted Nov 10, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-224 - A vulnerability was discovered and corrected in php. A flaw in ext/xml/xml.c could cause a cross-site scripting vulnerability.

tags | advisory, php, xss
systems | linux, mandriva
advisories | CVE-2010-3870
MD5 | 74053061e07f81ae0e754a2a2f36e6b8
Microsoft Office Drawing Shape Container Parsing
Posted Nov 10, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by insufficient validation when parsing an Office Art Drawing record, which contains "msofbtSp" records that specify certain flags. This can be exploited to corrupt memory via a specially crafted Office file. Successful exploitation allows execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-3334
MD5 | 8fb39fb2fb07a3f74270465fa0f971af
Mandriva Linux Security Advisory 2010-223
Posted Nov 10, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-223 - Multiple vulnerabilities were discovered and corrected in mysql. During evaluation of arguments to extreme-value functions (such as LEAST() and GREATEST()), type errors did not propagate properly, causing the server to crash. The server could crash after materializing a derived table that required a temporary table for grouping. A user-variable assignment expression that is evaluated in a logical expression context can be precalculated in a temporary table for GROUP BY. However, when the expression value is used after creation of the temporary table, it was re-evaluated, not read from the table and a server crash resulted. Pre-evaluation of LIKE predicates during view preparation could cause a server crash. Various other issues were addressed as well.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3839, CVE-2010-3840
MD5 | 3052a306751d3ea2e639de9988ee2d84
Microsoft PowerPoint PP7X32.DLL Record Parsing
Posted Nov 10, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a logic error in PP7X32.DLL when processing certain records in PowerPoint 95 files and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-2572
MD5 | 4f271dbece4935083f99ebdec3d3e935
Zero Day Initiative Advisory 10-244
Posted Nov 10, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-244 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of samples from a malformed MOV file utilizing the H.264 codec. While parsing data to render the stream, the application will miscalculate a length that is used to initialize a heap chunk that was allocated in a header. If the length is larger than the size of the chunk allocated, then a memory corruption will occur which can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2010-0515
MD5 | cff6f92c1244f266b0e78fda63f458eb
D-Link DIR-300 Authentication Bypass
Posted Nov 10, 2010
Authored by Karol Celinski

D-Link DIR-300 authentication bypass exploit.

tags | exploit, bypass
MD5 | ad04f948ab518acd8f74d00fab626a21
Remote SQL Command Execution
Posted Nov 10, 2010
Authored by SYSTEM_OVERIDE

Whitepaper called Remote SQL Command Execution. Written in Italian.

tags | paper, remote
MD5 | 2a93b453507f6d96f7a05d3c3d34e6b8
Oracle MySQL WITH ROLLUP Denial Of Service
Posted Nov 10, 2010
Authored by Shane Bester

Oracle MySQL versions prior to 5.1.49 suffer from a WITH ROLLUP related denial of service vulnerability.

tags | exploit, denial of service
MD5 | 601ed1cdedf87f19d468368c173b7aa5
Linux Kernel Stack Byte Leakage Exploit
Posted Nov 10, 2010
Authored by Dan Rosenberg | Site vsecurity.com

Local Linux kernel exploit that demonstrate how the "mem" array used as scratch space for socket filters is not initialized, allowing unprivileged users to leak kernel stack bytes.

tags | exploit, kernel, local
systems | linux
MD5 | bd6c0e576a643f7175d26ffa6dbcaedb
Woltlab Burning Board Userlocator 2.5 SQL Injection
Posted Nov 10, 2010
Authored by Easy Laster

Woltlab Burning Board Userlocator version 2.5 remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 44509225dab15c7ed37fd5263c6ffb16
Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution
Posted Nov 10, 2010
Authored by Francis Provencher

Novell Groupwise suffers from an Internet Agent IMAP LIST command remote code execution vulnerability.

tags | exploit, remote, imap, code execution
MD5 | 4046e88a214f5a0610ff00d737e3fdce
Mandriva Linux Security Advisory 2010-222
Posted Nov 10, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-222 - Multiple vulnerabilities were discovered and corrected in mysql. Joins involving a table with with a unique SET column could cause a server crash. Use of TEMPORARY InnoDB tables with nullable columns could cause a server crash. The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface. Using EXPLAIN with queries of the form SELECT. UNION. ORDER BY could cause a server crash. Various other issues were also addressed.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2010-3677, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682, CVE-2010-3833, CVE-2010-3834, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838, CVE-2010-3839, CVE-2010-3840
MD5 | bbbce87ac5eaae65694e4a7470e78e9a
XSSer Penetration Testing Tool 1.0
Posted Nov 10, 2010
Authored by psy | Site sourceforge.net

XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection.

tags | tool, scanner
systems | unix
MD5 | 4fa3e7c04ad401bde889b6b3c732b4bc
IBM OmniFind Cross Site Scripting / Privilege Escalation
Posted Nov 10, 2010
Authored by Fatih Kilic

IBM OmniFind suffers from cross site scripting, cross site request forgery, buffer overflow, session fixation and privilege escalation vulnerabilities. Various other issues also exist.

tags | exploit, overflow, vulnerability, xss, csrf
advisories | CVE-2010-3890, CVE-2010-3891, CVE-2010-3892, CVE-2010-3893, CVE-2010-3894, CVE-2010-3895, CVE-2010-3896, CVE-2010-3897, CVE-2010-3898, CVE-2010-3899
MD5 | 8984e1f7c368eddf5ad605b53d29a0cc
Joomla JQuarks4s 1.0.0 Blind SQL Injection
Posted Nov 10, 2010
Authored by Salvatore Fresta

The Joomla JQuarks4s component version 1.0.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 11b496ed17bdd6c57e157b6eb9160f7b
Page 1 of 2
Back12Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close