what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 74 RSS Feed

Files Date: 2010-06-09 to 2010-06-10

Secunia Security Advisory 40081
Posted Jun 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - chap0 has discovered a vulnerability in D.R. Software Audio Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1b2034dcadbccb609909154e80159356bb3ff7a0a15edc92ad1c511a7f2bc682
Secunia Security Advisory 40097
Posted Jun 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | ff5879a61de8fe664e3c67a77afde42c4a1147966d7c5aa6707e61ecf9b19869
Secunia Security Advisory 40106
Posted Jun 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions or potentially compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | ef2bda1caae1b6838e8ca80b6c6f701006040eb887b9a7124937f1ff2b6c805a
Secunia Security Advisory 40110
Posted Jun 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Apple Safari, which can be exploited by malicious people to potentially disclose sensitive information.

tags | advisory
systems | apple
SHA-256 | d862dc23de7af38e588e9ab0eb91145389ba1ef390c58e33825ed08a05236093
Scannedonly Samba VFS Module 0.20
Posted Jun 9, 2010
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

Changes: The VFS module handles applications that write to a temporary file and then rename to the final name better. It furthermore includes an experimental daemon for the F-prot anti-virus engine.
tags | tool, scanner
systems | unix
SHA-256 | 89e9edf66437efedf5fad8134fc523e4293b7917f1b8346840c540c6dbdfa9ff
Zero Day Initiative Advisory 10-106
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-106 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ovutil.dll module which is loaded by the ovwebsnmpsrv.exe process which in turn can be reached remotely through the jovgraph.exe CGI program. By supplying overly large values to variables passed through an HTTP request a sprintf can be made to overflow a static buffer. An attacker can leverage this to execute arbitrary code under the context of the user running the webserver.

tags | advisory, remote, web, overflow, arbitrary, cgi
advisories | CVE-2010-1961
SHA-256 | 6349a1bd3060c2050d441e1c279af5abec002cec2544760f646399fe43d792a9
Zero Day Initiative Advisory 10-105
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-105 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ovwebsnmpsrv.exe process which can be reached remotely through the jovgraph.exe CGI program. When the ovwebsnmpsrv.exe process is started a function responsible for parsing command line arguments does not properly handle unrecognized options. By supplying an overly large unrecognized option through an HTTP request the error handling functionality can be made to overflow a static buffer while creating the error message. An attacker can leverage this to execute arbitrary code under the context of the user running the webserver.

tags | advisory, remote, web, overflow, arbitrary, cgi
advisories | CVE-2010-1960
SHA-256 | 0c1a2b2d17574aa829d3fc97e050a16f7382be3ff7d6ac10bd8e37e2a78b3a82
Zero Day Initiative Advisory 10-104
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-104 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must open a malicious document. The specific flaw exists in the parsing of SXVIEW records in an Excel spreadsheet. Due to the lack of checking when parsing structure items for the record it is possible to write arbitrary data to a user controlled address. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-0821
SHA-256 | cbe099f36c8295d33c315678818cb80cb44f715a67c84a74ea53fbbd66066c17
TMAC For Linux 1.0-Beta
Posted Jun 9, 2010
Authored by Sagar Belure | Site sagar.belure.com

TMAC is a simple bash program for randomly changing the MAC address of a Network Interface Card (NIC) on Linux .

tags | bash
systems | linux, unix
SHA-256 | 4f6a66e27eed698a39d4a2960997b14b9c4eacfb20c36f5e8bd98b842239e67e
Microsoft Excel String Parsing Uninitialised Variable
Posted Jun 9, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Excel, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an uninitialised variable being used as size argument when copying data during parsing of certain record types. This can be exploited to corrupt memory via a specially crafted file. Successful exploitation may allow execution of arbitrary code. Microsoft Excel 2002 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-1252
SHA-256 | c7fcd27a138d8c91931ffa1bad82d555dfeda766e681520b3975edc5474fedb9
Microsoft Excel Record Parsing Input Validation
Posted Jun 9, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Excel, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to insufficient input validation when parsing a certain record type. This may lead to a variety of errors, including corruption of data on the stack. Successful exploitation may allow execution of arbitrary code. Microsoft Excel 2002 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-1251
SHA-256 | 3317b05f07d3375ba69a0a88550df747e13c68c010f5503c80c416ee969ba63a
Image Store 1.0 Shell Upload
Posted Jun 9, 2010
Authored by Mr.FireStormm

Image Store version 1.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 09d450eae2b58afceb32dedcc4f49d9bc14e506c6bf195b61e9b6e04fce0d820
Mandriva Linux Security Advisory 2010-112
Posted Jun 9, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-112 - Multiple vulnerabilities was discovered and fixed in glibc. The updated packages have been patched to correct these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4880, CVE-2010-0015, CVE-2010-0296, CVE-2010-0830
SHA-256 | 1539ef48affa2bdd4ff1fbcb10baca165eb4383531035668c0ec1d1d3f31e4c6
Technical Cyber Security Alert 2010-159B
Posted Jun 9, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-159B - Microsoft has released updates to address vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Office, Microsoft SharePoint Services, and Microsoft .NET Framework.

tags | advisory, vulnerability
systems | windows
SHA-256 | 7ad057dce9e2f190780239863458217708dedd0454505abe9ed7694a314e3fd2
Linksys WAP54Gv3 Remote Debug Root Shell
Posted Jun 9, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 has a debug interface allowing for the execution of root privileged shell commands. Hardcoded credentials, that cannot be changed by user, can be used for accessing the debug interface.

tags | exploit, shell, root
SHA-256 | fdf38433a8997957918a85f42b989155a632e3f26c1a3e0c4b124196a974e81a
HP Security Bulletin HPSBMA02537 SSRT010027
Posted Jun 9, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code under the context of the user running the web server.

tags | advisory, web, arbitrary, vulnerability
advisories | CVE-2010-1960, CVE-2010-1961
SHA-256 | 67cc3884d88a4fd6c68a1313fd79231d9a98d7e3061f3a85a03061cda3779f04
Core Security Technologies Advisory 2010.0415
Posted Jun 9, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - CubeCart PHP Free and Commercial Shopping Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
advisories | CVE-2010-0415
SHA-256 | 94116a9626ca38c007de10d783111163c26361648b8b5ad6d2ed15e85a12245c
Zero Day Initiative Advisory 10-103
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-103 - This particular vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel. User interaction is required in that a target must visit a malicious page or open a malicious file. The specific flaw exists in the parsing of DBQueryExt records in an Excel spreadsheet. Due to the lack of checking when parsing particular fields within the structure, it is possible to get a user-controlled pointer to be called. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-1253
SHA-256 | 6c1b37a29277ec5a096d645185821a76f4bcb2acb9f0399846219279154102e4
Zero Day Initiative Advisory 10-102
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-102 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required in that a target must visit a malicious page. The specific flaw exists within IE's support for the CStyleSheet object. When a style sheet array is created it contains a reference to it's root container. If the stylesheet was created as part of an element not in a markup the root container can be freed when that element is destroyed. When the application attempts to use the stylesheet after this, an invalid pointer is utilized. This can be leveraged by attackers to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary, root
advisories | CVE-2010-1262
SHA-256 | 2b47976bc648da7eafab2b47a2a1c90e4de158f77e44a02724f02ee855b903e0
PHPList 2.8.11 SQL Injection
Posted Jun 9, 2010
Authored by d3v1l

PHPList version 2.8.11 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0e9de7054d38234df16b6d2d493567f6c566c3c0c9e63c8242473e6b5baff14c
Phreebooks 2.0 Cross Site Scripting
Posted Jun 9, 2010
Authored by Gustavo Sorondo | Site cybsec.com

Phreebooks version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 39b119cc6d0555e3eea4e7a39e9dd4986e12adaa39380b4219d824bf21a32b61
Phreebooks 2.0 Local File Inclusion
Posted Jun 9, 2010
Authored by Gustavo Sorondo | Site cybsec.com

Phreebooks version 2.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | ac0b39dc56f65ddd39167573a3cfd15a5c730ef39e2e76c333868f165627463e
Phreebooks 2.0 Directory Traversal
Posted Jun 9, 2010
Authored by Gustavo Sorondo | Site cybsec.com

Phreebooks version 2.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 4a6f328a9fbe8fe24fa52a29a3dbbed62ea06b3339283a2e5f5fde6dd00d720d
Zero Day Initiative Advisory 10-101
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the application's support of the run-in display property. On insertion of a specific element with the "run-in" display property, the application will create a duplicate reference of a child element used to support that attribute. Upon destruction of the parent container, the application will then call the destructor for this child element multiple times. Successful exploitation can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2010-1749
SHA-256 | 9342f3bf4b7690aedf36bbb08aa68195117842acf9998983e5af8cdc3bec36bf
iRealty PHP Real Estate Script SQL Injection
Posted Jun 9, 2010
Authored by L0rd CrusAd3r

iRealty PHP Real Estate Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 2ec18846577eb1806976c7a0e4085f4638e60640db209d2161a089926c7a1faf
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close