what you don't know can hurt you
Showing 1 - 25 of 50 RSS Feed

Files Date: 2011-01-18

Zero Day Initiative Advisory 11-020
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-020 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Beehive. Authentication is not required to exploit this vulnerability. The specific flaw exists within 'voice-servlet/prompt-qa/Index.jspf'. During the creation of a file used for storing an evaluation parameter user supplied data is used to create a filename and another user specified field is later used to populate that file's contents. By inserting a null byte (0x00) into the filename the user can control the extension of the newly created file. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the oracle user.

tags | advisory, remote, arbitrary
advisories | CVE-2010-4417
MD5 | a222e224208d2be70fcaf9e209870264
Zero Day Initiative Advisory 11-019
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-019 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle GoldenGate Veridata. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way the application parses an XML soap request used for authorization to the management site. While copying string data from a tag into a buffer, the application will terminate the copy only when the byte being copied is of the value 0x20. By crafting a large enough string without this terminator, an attacker can exploit this to execute remote code under the context of the application.

tags | advisory, remote, arbitrary
advisories | CVE-2010-4416
MD5 | 4f9b27084974276d10964f0dcf97a8a3
Zero Day Initiative Advisory 11-018
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-018 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Database 11g. Authentication is not required to exploit this vulnerability. The specific flaw exists within a JSP script exposed via an HTTPS server running by default on TCP port 1158. The script allows clients to upload XML files to the server. However, if a NULL byte is supplied within a POST parameter during a request to this JSP page, the process will fail to properly append the XML extension to the created file. An attacker can abuse this to upload executable code which can later be accessed remotely allowing for code execution to be achieved on the server system.

tags | advisory, remote, web, arbitrary, tcp, code execution, xxe
advisories | CVE-2010-3600
MD5 | 8a671f6570a0a056f6177ff023890a97
Simploo CMS 1.7.1 PHP Code Execution
Posted Jan 18, 2011
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Simploo CMS versions 1.7.1 and below suffers from a remote PHP code execution vulnerability.

tags | exploit, remote, php, code execution
MD5 | 83c6bc523d65093f2d7b1dff8c765542
Zero Day Initiative Advisory 11-017
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-017 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Audit Vault. Authentication is not required to exploit this vulnerability. The flaw exists within the av component which listens by default on TCP port 5700. When handling an action.execute request the process evaluates code provided as a parameter without proper validation. This allows for creation of arbitrary objects. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the oracle user.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2010-4449
MD5 | 6dd24a4746a0728e4a8d6f3b88c270e1
Zero Day Initiative Advisory 11-016
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-016 - This vulnerability allows remote attackers to inject arbitrary SQL on vulnerable installations of Oracle Real User Experience Insight. Authentication is not required to exploit this vulnerability. The specific flaw exists within a portion of the application which parses log files. Due to the component escaping characters improperly when inserting into a UTF-8 database, a user can inject a quote and provide arbitrary SQL statements.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3594
MD5 | 243d24acbd115250618faa05e6b39e95
Zero Day Initiative Advisory 11-015
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-015 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LoadRunner. Authentication is not required to exploit this vulnerability. The specific flaw exists within the magentproc.exe process which binds by default on TCP ports 5001, 5002, 5003, 50500, and 54345. The process blindly trusts a user supplied 32-bit value as an allocation size. It then copies data directly from a request packet into the statically allocated heap buffer. This can be abused by attackers to execute remote code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2011-0272
MD5 | 4a06c3ee857d355805773e6658338fc6
Zero Day Initiative Advisory 11-014
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-014 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Java OpenJDK. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the IcedTea.so component. When handling the an applet the process fails to properly restrict permission of code. It is possible to create and instantiate subclasses of ClassLoader. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

tags | advisory, java, remote, arbitrary
advisories | CVE-2010-4351
MD5 | 21873118c8f152d207f40f1ff3e803cb
Zero Day Initiative Advisory 10-301
Posted Jan 18, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-301 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trent Micro Control Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within how the mrf.exe component composes a string used to display an error message. The application will build the string using a buffer located on the stack using a sprintf call. As attacker controlled data is used to construct the string, this can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
MD5 | 8dfb95b286c273fb7c8d35ff7b53666c
TOR Virtual Network Tunneling Tool 0.2.1.29
Posted Jan 18, 2011
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: A remote heap overflow vulnerability that could allow remote code execution was fixed along with other issues.
tags | tool, remote, local, peer2peer
systems | unix
advisories | CVE-2011-0427
MD5 | 1cd4feea84f2b066717b500d090bcf65
Mobius Forensic Toolkit 0.5.6
Posted Jan 18, 2011
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The Hive Report features 8 new registry reports: installed programs, storage devices, optical devices, network adapters, video adapters, imaging devices, monitor devices, and user passwords. The user passwords report shows LM and NT hashes unencrypted. Minor improvements and bugfixes were made.
tags | tool, python, forensics
systems | unix
MD5 | cf13fed9c691c5f999a4e18bbfa9df1d
Joomla allCineVid 1.0.0 Blind SQL Injection
Posted Jan 18, 2011
Authored by Salvatore Fresta | Site salvatorefresta.net

Joomla allCineVid component version 1.0.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 81d574107faf9cbf3377ee1c7bb327f3
Ubuntu Security Notice USN-1044-1
Posted Jan 18, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1044-1 - Remi Denis-Courmont discovered that D-Bus did not properly validate the number of nested variants when validating D-Bus messages. A local attacker could exploit this to cause a denial of service.

tags | advisory, denial of service, local
systems | linux, ubuntu
advisories | CVE-2010-4352
MD5 | f9fa3795fd3a5a94207ca3121aa57ee6
Asterisk Project Security Advisory - AST-2011-001
Posted Jan 18, 2011
Authored by Matthew Nicholson | Site asterisk.org

Asterisk Project Security Advisory - When forming an outgoing SIP request while in pedantic mode, a stack buffer can be made to overflow if supplied with carefully crafted caller ID information. This vulnerability also affects the URIENCODE dialplan function and in some versions of asterisk, the AGI dialplan application as well. The ast_uri_encode function does not properly respect the size of its output buffer and can write past the end of it when encoding URIs.

tags | advisory, overflow
MD5 | dec8da80a735714f86c79f8fce86b85c
B-Cumulus Cross Site Scripting
Posted Jan 18, 2011
Authored by MustLive

B-Cumulus suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | ad920b09ad3ac336848906c48db66406
Mandriva Linux Security Advisory 2011-012
Posted Jan 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-012 - Multiple vulnerabilities has been found and corrected in mysql. storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement. MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column. MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Various other issues have also been addressed.

tags | advisory, remote, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2010-3676, CVE-2010-3677, CVE-2010-3678, CVE-2010-3679, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682, CVE-2010-3683
MD5 | baedc5cdeb7d5939eee1e7e3534ad572
Debian Security Advisory 2148-1
Posted Jan 18, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2148-1 - The developers of Tor, an anonymizing overlay network for TCP, found three security issues during a security audit. A heap overflow allowed the execution of arbitrary code, a denial of service vulnerability was found in the zlib compression handling and some key memory was incorrectly zeroed out before being freed. The latter two issues do not yet have CVE identifiers assigned.

tags | advisory, denial of service, overflow, arbitrary, tcp
systems | linux, debian
advisories | CVE-2011-0427
MD5 | 8049c31057799402ba68f2925972f48e
Google Chrome 8.0.552.237 Denial Of Service
Posted Jan 18, 2011
Authored by Vuk Ivanovic

Google Chrome version 8.0.552.237 address overflow denial of service exploit.

tags | exploit, denial of service, overflow
MD5 | d2a07997c71fb7a52d1febec0d34ec03
Secunia Security Advisory 42953
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Simploo CMS, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | e0690cdf3ca3891bda6aac3fc9006fb5
Secunia Security Advisory 42916
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 1d83f9ffa64c8876982686b1fb4453eb
Secunia Security Advisory 42820
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for prewikka. This fixes a weakness, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | linux, gentoo
MD5 | 78f248bc9256eeae0f5ea1b379852981
Secunia Security Advisory 42910
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, debian
MD5 | 68fae71d8a9bbabf04c28302cc75d504
Secunia Security Advisory 42932
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
MD5 | 7928702a47c0bacf1930fbe186a28341
Secunia Security Advisory 42908
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libvpx. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 706f6130aeab4be4c68363f9e6ae70db
Secunia Security Advisory 42917
Posted Jan 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
MD5 | b7d4aa6e0f715981ab78262b494c583b
Page 1 of 2
Back12Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    17 Files
  • 20
    Nov 20th
    15 Files
  • 21
    Nov 21st
    16 Files
  • 22
    Nov 22nd
    2 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close