Exploit the possiblities
Showing 1 - 25 of 37 RSS Feed

Files Date: 2011-05-09

Zero Day Initiative Advisory 11-154
Posted May 9, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-154 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase M-Business Anywhere. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gsoap.exe module exposed by the webserver that listens by default on TCP ports 8093 and 8094. A remote user can send an specially crafted SOAP packet with an invalid 'password' closing tag via a POST request to the web server to trigger a buffer overflow in this module. Exploitation of this issue leads to remote code execution under the context of the target service.

tags | advisory, remote, web, overflow, arbitrary, tcp, code execution
MD5 | 7f0fe764bdb2b03fc55deabe3fa6b339
HP Security Bulletin HPSBOV02682 SSRT100495
Posted May 9, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBOV02682 SSRT100495 - Potential vulnerabilities have been identified with HP OpenVMS running Kerberos. The vulnerabilities could be remotely exploited to create a Denial of Service (DoS) or execution of arbitrary code, or by a remote unauthorized user to modify data, prompts, or responses. Revision 1 of this advisory.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2008-0062, CVE-2008-0947, CVE-2008-0948, CVE-2009-0846, CVE-2009-4212, CVE-2010-1323
MD5 | 2037077904f08f30f6a0915a2acf36d4
HP Security Bulletin HPSBTU02684 SSRT100390
Posted May 9, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBTU02684 SSRT100390 - A potential vulnerability has been identified with HP Tru64 UNIX running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, java, denial of service
systems | unix
advisories | CVE-2010-4476
MD5 | 14948e7496d321ab47822c67396b4ca2
HP Security Bulletin HPSBOV02634 SSRT100390
Posted May 9, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBOV02634 SSRT100390 - A potential vulnerability has been identified with HP OpenVMS running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, java, denial of service
advisories | CVE-2010-4476
MD5 | 60c68624322e0a388a09911df52dc23a
Securing The Kernel Via Static Binary Rewriting And Program Shepherding
Posted May 9, 2011
Authored by Piotr Bania

Whitepaper called Security the Kernel via Static binary Rewriting and Program Shepherding. -

tags | paper, kernel
MD5 | 22adf71f2de33aa77c98ceb1c592d5a0
Glyptodon File System Analyzer 1.2
Posted May 9, 2011
Authored by Emeric Nasi

Glyptodon is a little file-system analyzer for Linux systems. It is written in bash and it comes with an installer to make it run everyday automatically. This script writes some general information about file permissions, socket, ownership, etc. It also verifies the file-system for potential risks, such as set-uid files, world writable files, symlinks nouser files, etc.

tags | tool, bash
systems | linux, unix
MD5 | 372fb22f87171701b95c76e160f6f758
Perl Null Pointer Dereference
Posted May 9, 2011
Authored by Jonathan Brossard

When given a wrong number of arguments, a number of perl functions will attempt to read memory from an unmapped location, resulting in a deterministic crash.

tags | advisory, perl
advisories | CVE-2011-0761
MD5 | 90a557b0c4869f35779003db8fedaed0
Opera SELECT SIZE Arbitrary Null Write
Posted May 9, 2011
Authored by Jonathan Brossard

Opera up to and including version 10.60 is vulnerable to an arbitrary memory write of 0x00000000, 4 byte aligned, when processing an html page featuring a SELECT tag with a very large SIZE parameter.

tags | advisory, arbitrary
advisories | CVE-2011-1824
MD5 | cf523544c7b3477c18228bec543636bb
Ampache 3.5.4 Cross Site Scripting
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Ampache version 3.5.4 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
MD5 | 17d6ad6c49246899a620963c9529f6fa
ECoder 0.4.10 Cross Site Scripting
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in ECoder version 0.4.10 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
MD5 | ef19e033dff9bff59774c2579e7a7b26
Exponent 2.0.0 Beta 1.1 Local File Inclusion
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

Exponent version 2.0.0 Beta 1.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | a9bfc3f2f573f47410b8a7203d0f20dd
VoIP Security - Methodology And Results
Posted May 9, 2011
Authored by Barrie Dempster | Site ngssoftware.com

Whitepaper called VoIP Security - Methodology and Results.

tags | paper
MD5 | a928022bf463ff642fd623c09cea7240
Remote And Local Exploitation Of Network Drivers
Posted May 9, 2011
Authored by Yuriy Bulygin

Whitepaper called Remote and Local Exploitation of Network Drivers.

tags | paper, remote, local
MD5 | 051b476e631da4aaba522a616630f153
Exponent 2.0.0 Beta 1.1 Shell Upload
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

An arbitrary upload vulnerability in Exponent version 2.0.0 beta 1.1 can be exploited to upload a PHP shell.

tags | exploit, arbitrary, shell, php
MD5 | 1576adab6bd9492ea56843361bf6d569
Gelsheet 1.02 Cross Site Scripting
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Gelsheet version 1.02 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
MD5 | b798b834a7f8bdb3ef26071bc6a63ff5
GetSimple 3.0 Local File Inclusion
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in GetSimple version 3.0 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
MD5 | 86f2d24deeac5ca98af90b672e3bf240
phpWebSite 1.7.1 Shell Upload
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

An arbitrary upload vulnerability in phpWebSite version 1.7.1 can be exploited to upload a PHP shell.

tags | exploit, arbitrary, shell, php
MD5 | 6fbfc8430e23862657fe46a1ce22ce1e
Serva32 1.2.00 RC1 Denial Of Service
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A denial of service vulnerability can be exploited to crash Serva32 version 1.2.00 RC1.

tags | exploit, denial of service
MD5 | d3fdbe5aa4d05931bd3f603a3195adb1
Serva32 1.2.00 RC1 Directory Traversal
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A directory traversal vulnerability in Serva32 version 1.2.00 RC1 can be exploited to read files outside of the web root.

tags | exploit, web, root, file inclusion
MD5 | 50ef8903676ca441f2d6aed3a8434219
TCExam 11.1.029 SQL Injection
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

TCExam version 11.1.029 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a3f1dca6487f0e96faac5dec328288f9
Secunia Security Advisory 44495
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered two vulnerabilities in TCExam, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 05fc7aa5b087cff62dae955f363f13b5
Secunia Security Advisory 44522
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Skype for Mac, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 4496cc4b4d05ce76de10d72411e2313c
Secunia Security Advisory 44529
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for asterisk. This fixes two vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 6c056f4dcc7baef734c249b99c699056
Secunia Security Advisory 44484
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KnockOut has discovered a vulnerability in DORG, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 81681946868026e374747815cbb35383
Secunia Security Advisory 44479
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for otrs2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | a4dd314f4b5a50d04d361c1d19946466
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close