what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 31 of 31 RSS Feed

Files Date: 2010-04-22 to 2010-04-23

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion
Posted Apr 22, 2010
Authored by ItSecTeam

LightNEasy version 3.1.x suffers from file disclosure, local file inclusion, software installation and file upload vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure, file upload
SHA-256 | b46d9ffa03938924070a5a689b35a41395ca675c37d1491c970fa53b1caf2e5b
Zero Day Initiative Advisory 10-077
Posted Apr 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-077 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Download Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the gp.ocx ActiveX control. This control has a CLSID of {E2883E8F-472F-4fb0-9522-AC9BF37916A7} and the ProgID Atlcom.get_atlcom. Upon initialization this control copies the values from two parameters into a fixed length buffer. If supplied with large enough values this can lead lead to a buffer overflow that can be leveraged to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, overflow, arbitrary, activex
advisories | CVE-2010-1278
SHA-256 | 128165a7d8d8eef28948328c1084fc940def985af623cd253fd21e35d7905329
Joomla Portfolio Local File Inclusion
Posted Apr 22, 2010
Authored by Mr.tro0oqy

The Joomla Portfolio component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | eb8d3627bbad8db35d7eb0679f9c0905787b1e9d6b8e376214a7fe5acff0e054
Cisco Security Advisory 20100421-vsc
Posted Apr 22, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Small Business Video Surveillance Cameras and Cisco RVS4000 4-port Gigabit Security Routers contain a vulnerability that could allow an authenticated user to view passwords for other users, regardless of the authenticated user's level of authorization. An unprivileged user could take advantage of this vulnerability to gain full administrative access on the device or view another user's credentials.

tags | advisory
systems | cisco
advisories | CVE-2010-0593
SHA-256 | 2891fd746e404214f8f7ec8bdef0e17c186d1686f316c0e22b4cac7e4176506f
imlib2 "IMAGE_DIMENSIONS_OK()" Logic Error
Posted Apr 22, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in imlib2, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused by a logic error within the "IMAGE_DIMENSIONS_OK()" macro in src/lib/image.h. This can be exploited to cause heap-based buffer overflows via e.g. specially crafted ARGB, XPM, and BMP image files.

tags | advisory, overflow
advisories | CVE-2010-0991
SHA-256 | 468d8120f75f67faa1343a7d1231b3d69caa8405116258fcbd1b58c624cfdefd
Core Security Technologies Advisory 2010.0406
Posted Apr 22, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A Cross Site Scripting (XSS) vulnerability has been discovered in CactuShop.

tags | exploit, xss
advisories | CVE-2010-1486
SHA-256 | 27b87383b836a5d421fa2c92b53e6cadc8c16ca54e451af91f467dfb9ae90f63
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close