what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files Date: 2010-01-22 to 2010-01-23

VP-ASP SQL Injection / Cross Site Scripting
Posted Jan 22, 2010
Authored by CodeScan Labs

VP-ASP suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, xss, sql injection, asp
SHA-256 | 03144e9c7692da406834dc7e125ff0f52a6114f18f5370f2ff5026b33c71728d
Zero Day Initiative Advisory 10-06
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-06 - This vulnerability allows remote attackers to execute code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a user must open a malicious file or visit a malicious web site. The specific flaw exists during the parsing of GIF files with forged chunk sizes. The player uses values from the file improperly when allocating a buffer on the heap. An attacker can abuse this to create and then overflow heap buffers leading to arbitrary code execution in the context of the currently logged in user.

tags | advisory, remote, web, overflow, arbitrary, code execution
advisories | CVE-2009-4242
SHA-256 | 3fce3b61a72c4ec2153f507559b7bb6126220250160813ce7c41e41b43f2eb93
cPanel HTTP Response Splitting
Posted Jan 22, 2010
Authored by Trancer

cPanel and WHM versions 11.25 (up to build 42174) allows CR injection that can be leveraged for HTTP response splitting attacks.

tags | exploit, web
SHA-256 | 0b670ad065f6c4108376593723c9a29dc3176ab42c972663cc916ea7c24106a6
Mandriva Linux Security Advisory 2010-022
Posted Jan 22, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-022 - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_free_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct thies issue.

tags | advisory, remote, web, denial of service, cryptography, php, memory leak
systems | linux, mandriva
advisories | CVE-2009-4355
SHA-256 | 5fab82dded984f2d28a43ce0b364ecbb0af960fb9cd65d21a63b32da93c43922
RadASM 2.2.1.5 .mnu Local Unicode Overflow
Posted Jan 22, 2010
Authored by SkuLL-HacKeR

RadASM version 2.2.1.5 .mnu file local unicode overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | a1288cd5958514bec6542dd8a9b0f2d9fbfe1b0a3b4766fcb20e68ed2092c684
Zero Day Initiative Advisory 10-05
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-05 - This vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must open a malicious file or visit a malicious web site. The specific flaw exists during the parsing of files with improperly defined ASMRuleBook structures. A controllable memory allocation allows for an attacker to corrupt heap memory. Attacker controlled data from the corrupt heap is later used as an object pointer which can be leveraged to execute arbitrary code in the context of the currently logged in user.

tags | advisory, remote, web, arbitrary
advisories | CVE-2009-4241
SHA-256 | 5c6d1cc062494d8ea73b5a3732915836b9f6fb7683508db4b25f1456392114cb
Zero Day Initiative Advisory 10-04
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-04 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco CiscoWorks Internetwork Performance Monitor. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of CORBA GIOP requests. By making a specially crafted getProcessName GIOP request an attacker can corrupt memory. Successful exploitation can result in a full compromise with SYSTEM credentials.

tags | advisory, remote, arbitrary
systems | cisco
advisories | CVE-2010-0138
SHA-256 | 67b1ac7c04e0e6edafe009f1aaeb1b1ea8eb95fc4b6f17009ed557c3bb4034cf
Debian Linux Security Advisory 1975-1
Posted Jan 22, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1975-1 - One year after the release of Debian GNU/Linux 5.0 alias 'lenny' and nearly three years after the release of Debian GNU/Linux 4.0 alias 'etch' the security support for the old distribution (4.0 alias 'etch') is coming to an end next month.

tags | advisory
systems | linux, debian
SHA-256 | 25113a03e29016ad5a216cedc8f90b92213057d1bf2ace2361a58e3d6d22e07f
OpenX 2.6.1 SQL Injection
Posted Jan 22, 2010
Authored by AndySoon

OpenX version 2.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0fc96d5c1a7a329f4f8f5d1c96d2bc72f039be74c4621bed8149a1a3b9415fbc
Oracle TNS Listener AUTH_SESSKEY Buffer Overflow.
Posted Jan 22, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Oracle. When sending a specially crafted packet containing a long AUTH_SESSKEY value to the TNS service, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-1979
SHA-256 | e9967e777e3c8fe58c92669e0506711f78d2e29ac497889ccf38191214de029e
HP OpenView Network Node Manager ovalarm.exe CGI Buffer Overflow
Posted Jan 22, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.53. By sending a specially crafted CGI request to ovalarm.exe, an attacker can execute arbitrary code. This specific vulnerability is due to a call to "sprintf_new" in the "isWide" function within "ovalarm.exe". A stack buffer overflow occurs when processing an HTTP request that contains the following. 1. An "Accept-Language" header longer than 100 bytes 2. An "OVABverbose" URI variable set to "on", "true" or "1" The vulnerability is related to "_WebSession::GetWebLocale()" .. NOTE: This exploit has been tested successfully with a reverse_ord_tcp payload.

tags | exploit, web, overflow, arbitrary, cgi
advisories | CVE-2009-4179
SHA-256 | e54d42cfbc8bbc738ef568c5e491af71d30811bb7fa5db456ba682b823955033
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close