exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files Date: 2010-02-02 to 2010-02-03

Secunia Security Advisory 38448
Posted Feb 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in C++ Sockets Library, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 89af9bcc1854b59139c1f98a6db697a1ccfda783cef243fbd5c2227d574d6228
Secunia Security Advisory 38415
Posted Feb 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in snif, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | af368a6fc60b34188e85242022b3033667b201a48af793a341fd253e4e77e449
Core Security Technologies Advisory 2009.1126
Posted Feb 2, 2010
Authored by Core Security Technologies, Francisco Falcon | Site coresecurity.com

Core Security Technologies Advisory - Corel Paint Shop Pro Photo X2 is prone to a heap-based buffer overflow when processing malformed FPX files, because it trusts user-controlled data located inside a FPX file and uses it as a loop counter when copying data from a FPX file into a fixed-size buffer located in the heap. This vulnerability can be exploited to overwrite adjacent heap chunks metadata, and possibly to gain arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | a6f2c88aa2e79b669f40a3e754b153097c2a704191671ee32dc54d20f872330a
iDEFENSE Security Advisory 2010-02-01.3
Posted Feb 2, 2010
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.01.10 - Remote exploitation of an integer overflow vulnerability in Real Networks Inc.'s RealPlayer version 11 could allow an attacker to execute arbitrary code. iDefense Labs has confirmed the existence of an integer overflow issue within RealPlayer when handling compressed GIF files. The vulnerability occurs in the CGIFCodec::InitDecompress() function, which does not properly validate a field in the GIF file before using it in an arithmetic operation that calculates the size of a heap buffer. This issue leads to heap corruption, which can result in the execution of arbitrary code. iDefense confirmed RealPlayer version 11 is vulnerable to this issue.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-4245
SHA-256 | 3f0c3242b0afbee7c3c7828a48aa049b6a72341359deef2d7363e819bcf7480f
iDEFENSE Security Advisory 2010-02-01.2
Posted Feb 2, 2010
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.01.10 - Remote exploitation of an integer overflow vulnerability in RealNetworks Inc.'s Real Player could allow an attacker to execute arbitrary code with the privileges of the current user. This problem specifically exists in the CMediumBlockAllocator::Alloc method. When calculating the size of a memory allocation, an integer overflow occurs. This leads to heap corruption, which can result in the execution of arbitrary code. iDefense has confirmed the existence of this vulnerability in Real Player versions 10.5 (build 6.0.12.883) and 11 (build 6.0.14.738) on Windows. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-4248
SHA-256 | 1df83847e5c312d16805b0467196f103f05a9e417ac7ca5b56ff18c5fc13833e
iDEFENSE Security Advisory 2010-02-01.1
Posted Feb 2, 2010
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.01.10 - Remote exploitation of an integer overflow vulnerability in RealNetworks Inc.'s RealPlayer 11 could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability specifically exists in the handling of the 'chunked' Transfer-Encoding method. This method breaks the file the server is sending into 'chunks'. For each chunk, the server first sends the length of the chunk in hexadecimal, followed by the chunk data. This is repeated until there are no more chunks. The server then sends a chunk length of zero (0) indicating the end of the transfer. When processing these chunks, an integer overflow occurs, which results in a heap overflow. This leads to the execution of arbitrary code. iDefense has confirmed the existence of this vulnerability in RealPlayer version 11 on Windows. A nightly build of RealPlayer 10.1.0.3830 for Linux was also confirmed to be vulnerable. Previous versions do not appear be affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, windows
advisories | CVE-2009-4243
SHA-256 | 3a83f3b4b0b0d8cec0aad45aed72e71c09910a4ab59fde61b44afcb586e10dd8
Joomla Gambling SQL Injection
Posted Feb 2, 2010
Authored by md.r00t

The Joomla Gambling component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4fa3bb8992768d637aa537d79fe9d5abadbff75dd693615a89f941eb87ea8e3f
Oracle Denial Of Service
Posted Feb 2, 2010
Authored by Tobias Klein | Site trapkit.de

The kernel of Oracle Solaris contains a vulnerability in the code that handles UCODE_GET_VERSION IOCTL requests. The vulnerability allows a local unprivileged user the ability to panic a Solaris x86 Intel-based system (32-bit/64-bit mode) due to a NULL pointer dereference. The ability to panic a system is a type of Denial of Service (DoS). The issue can be triggered by sending a specially crafted IOCTL request to the kernel.

tags | advisory, denial of service, x86, kernel, local
systems | solaris
advisories | CVE-2010-0453
SHA-256 | a524a1ba9d5742e9a071414fff6dae55d1497bb58dc841e1c7577a689c3d653c
Drupal MP3 Player Cross Site Scripting
Posted Feb 2, 2010
Authored by Martin Barbella

Drupal's MP3 Player module version 6.x-1.0-beta1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bea709af4e24c40c41d70a3135a1196e412d132182f2fa56f7e35583b5bfc365
AlegroCart 1.1 Cross Site Request Forgery
Posted Feb 2, 2010
Authored by The.Morpheus

AlegroCart version 1.1 suffers from a cross site request forgery vulnerability. This example changes the administrator's password.

tags | exploit, csrf
SHA-256 | 90f1b2c5624c9fb52ebecaac27a01702433a161bb638ebabf08324fada548d07
Bugzilla Information Disclosure
Posted Feb 2, 2010
Site bugzilla.org

Bugzilla versions before 3.0.11, 3.2.6, 3.4.5, and 3.5.3 allow for content browsing of various directories that may have sensitive information in them if customized. Bugzilla versions 3.3.1 to 3.4.4, 3.5.1, and 3.5.2 suffer from a bug moving vulnerability.

tags | advisory, info disclosure
advisories | CVE-2009-3989, CVE-2009-3387
SHA-256 | 4080b4649189b96d44e9f146ffc4dd75e28aa00ddbc98f128ecb4ee6cc0579ef
jBCrypt Entropy Reduction
Posted Feb 2, 2010
Authored by Damien Miller

jBCrypt versions prior to 0.3 suffered from a bug related to character encoding that substantially reduced the entropy of hashed passwords containing non US-ASCII characters.

tags | advisory
SHA-256 | dd72d7dabb106e0710c14a2f1935188fc712a50d8d1d76a5ac6d2777e8f3c708
Rediff.com Cross Site Scripting
Posted Feb 2, 2010
Authored by Rockey Killer, w4rl0ck.d0wn

Rediff.com suffers from a cross site scripting vulnerability due to a lack of sanitizing the subject field of incoming email.

tags | advisory, xss
SHA-256 | 3cebcc5aa2a4f07c25bb3e97a82db04ed412f4e4aeb065ca6aed22ba6e02d0d9
Squipy Proxy Server 1.2
Posted Feb 2, 2010
Authored by Pepelux | Site pepelux.org

Squipy is a proxy server that allows you to capture and modify HTTP traffic.

tags | web
SHA-256 | a9b89ba7b14dd63268ecdafb6173cf172d87074e953088ec884dac7dae401937
EmiratesHost Insecure Cookie Handling
Posted Feb 2, 2010
Authored by jago-dz

EmiratesHost suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | ddeb6326f49ae789f8d3ab3d8aa8042162bc2a0022268420986500c74c7ac28d
Core Security Technologies Advisory 2010.0106
Posted Feb 2, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - The Cisco Secure Desktop web application does not sufficiently verify if a well-formed request was provided by the user who submitted the POST request, resulting in a cross-site scripting vulnerability. In order to be able to successfully make the attack, the Secure Desktop application on the Cisco Appliance must be turned on.

tags | exploit, web, xss
systems | cisco
advisories | CVE-2010-0440
SHA-256 | f8c48a5475b2b0502d92201a787561418f197b00968eea66badd89e44af41aab
Joomla Yelp SQL Injection
Posted Feb 2, 2010
Authored by bhunt3r

The Joomla Yelp component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e375a48065840c20e57600a6ffcd8532b7b14824c7a895b7b4869c23f4ff6261
Joomla Job SQL Injection
Posted Feb 2, 2010
Authored by bhunt3r

The Joomla Job component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3a336a7c3209ba872630da0a9da0cc6a1142fa1d64656f205d6485beeee40fc3
Mandriva Linux Security Advisory 2010-030
Posted Feb 2, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-030 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request. The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read. An issue was discovered in 2.6.32.x kernels, which sets unsecure permission for devtmpfs file system by default. Additionally, it was added support for Atheros AR2427 Wireless Network Adapter.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3080, CVE-2009-4005
SHA-256 | 8b6d1e6d71088d7123baf7cdf602337bb9e7c8f9acce4061459fbdec59f50236
Marka Grup Cross Site Request Forgery
Posted Feb 2, 2010
Authored by Cyber_945

Marka Grup suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5232b0b1e83d55d55d4a1c07fae91b3eb50deba34b932f8cf812b97d23e0cee7
Marka Grup SQL Injection
Posted Feb 2, 2010
Authored by Cyber_945

Marka Grup script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0ce7c4f2c36ff3e23c80814ce8c35614a3aebcb1458a852701705b9199095ede
Shout! CMS SQL Injection
Posted Feb 2, 2010
Authored by Zero Cold

Shout! CMS suffers from a remote SQL blind injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b6f14d6e384b217731effc312c97d703ceae063cadb336c387b2711729b19208
Evernew Free Joke Script SQL Injection
Posted Feb 2, 2010
Authored by MizoZ

Evernew Free Joke Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0440363c025a4a7034c9f444129e66ce10ec3b19e97b1889295c94d55944ce78
VMware Security Advisory 2010-0002
Posted Feb 2, 2010
Authored by VMware | Site vmware.com

VMware Security Advisory - JRE update to version 1.5.0_22, which addresses multiple security issues that existed in earlier releases of JRE.

tags | advisory
advisories | CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671
SHA-256 | 9fdca7e08dfc8d5434a4f2c697c71bb80affbf3145121242ba0ffd398e591d00
Page 2 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close