exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 31 of 31 RSS Feed

Files Date: 2010-04-22 to 2010-04-23

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion
Posted Apr 22, 2010
Authored by ItSecTeam

LightNEasy version 3.1.x suffers from file disclosure, local file inclusion, software installation and file upload vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure, file upload
SHA-256 | b46d9ffa03938924070a5a689b35a41395ca675c37d1491c970fa53b1caf2e5b
Zero Day Initiative Advisory 10-077
Posted Apr 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-077 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Download Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the gp.ocx ActiveX control. This control has a CLSID of {E2883E8F-472F-4fb0-9522-AC9BF37916A7} and the ProgID Atlcom.get_atlcom. Upon initialization this control copies the values from two parameters into a fixed length buffer. If supplied with large enough values this can lead lead to a buffer overflow that can be leveraged to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, overflow, arbitrary, activex
advisories | CVE-2010-1278
SHA-256 | 128165a7d8d8eef28948328c1084fc940def985af623cd253fd21e35d7905329
Joomla Portfolio Local File Inclusion
Posted Apr 22, 2010
Authored by Mr.tro0oqy

The Joomla Portfolio component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | eb8d3627bbad8db35d7eb0679f9c0905787b1e9d6b8e376214a7fe5acff0e054
Cisco Security Advisory 20100421-vsc
Posted Apr 22, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Small Business Video Surveillance Cameras and Cisco RVS4000 4-port Gigabit Security Routers contain a vulnerability that could allow an authenticated user to view passwords for other users, regardless of the authenticated user's level of authorization. An unprivileged user could take advantage of this vulnerability to gain full administrative access on the device or view another user's credentials.

tags | advisory
systems | cisco
advisories | CVE-2010-0593
SHA-256 | 2891fd746e404214f8f7ec8bdef0e17c186d1686f316c0e22b4cac7e4176506f
imlib2 "IMAGE_DIMENSIONS_OK()" Logic Error
Posted Apr 22, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in imlib2, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused by a logic error within the "IMAGE_DIMENSIONS_OK()" macro in src/lib/image.h. This can be exploited to cause heap-based buffer overflows via e.g. specially crafted ARGB, XPM, and BMP image files.

tags | advisory, overflow
advisories | CVE-2010-0991
SHA-256 | 468d8120f75f67faa1343a7d1231b3d69caa8405116258fcbd1b58c624cfdefd
Core Security Technologies Advisory 2010.0406
Posted Apr 22, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A Cross Site Scripting (XSS) vulnerability has been discovered in CactuShop.

tags | exploit, xss
advisories | CVE-2010-1486
SHA-256 | 27b87383b836a5d421fa2c92b53e6cadc8c16ca54e451af91f467dfb9ae90f63
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close