what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 51 RSS Feed

Files Date: 2010-07-16 to 2010-07-17

Absolute Shopping Cart Cross Site Scripting
Posted Jul 16, 2010
Authored by D4rk357

Absolute Shopping Cart suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dee0f5cb61f9ac40aba384ad7f5576ebc85c2d974cbf6d77668c4dd5d072eb06
Mandriva Linux Security Advisory 2010-134
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-134 - Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver. Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter. As a precaution ghostscriptc has been rebuilt to link against the system libpng library which was fixed with MDVSA-2010:133.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-4270, CVE-2010-1628
SHA-256 | 3d73e4babfd4b5c82e8bde7f78c70aac24ac68d203e10354a9d51ebf133af653
GIGABYTE Dldrv2 ActiveX Control Array Indexing
Posted Jul 16, 2010
Site secunia.com

Secunia Research has discovered a vulnerability in GIGABYTE Dldrv2 ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation of the "item" argument passed to the "SetDLInfo()" method and can be exploited via array-indexing errors to corrupt memory. Successful exploitation allows execution of arbitrary code. GIGABYTE Dldrv2 ActiveX Control version 1.4.206.11 is affected.

tags | advisory, arbitrary, activex
advisories | CVE-2010-1518
SHA-256 | 5a355eea57a95ebf55598d637130c88c0d5d14102954591e3ec5525966ddd53f
GIGABYTE Dldrv2 ActiveX Control Unsafe Methods
Posted Jul 16, 2010
Site secunia.com

Secunia Research has discovered some vulnerabilities in GIGABYTE Dldrv2 ActiveX Control, which can be exploited by malicious people to compromise a user's system. The unsafe method "dl()" allows automatically downloading and executing an arbitrary file. Combined usage of the unsafe methods "SetDLInfo()" and "Bdl()" allows automatically downloading an arbitrary file to an arbitrary location on the user's system. GIGABYTE Dldrv2 ActiveX Control version 1.4.206.11 is affected.

tags | advisory, arbitrary, vulnerability, activex
advisories | CVE-2010-1517
SHA-256 | 08c0f290a97fa5c7bda21b8209232dbc8ff81b03dddee78d3ad8e64cdd838050
HP Security Bulletin HPSBUX02556 SSRT100014
Posted Jul 16, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running rpc.ttdbserver. The vulnerability could be exploited remotely to execute arbitrary code.

tags | advisory, arbitrary
systems | hpux
advisories | CVE-2010-0083
SHA-256 | 3c35f61d9c53605670ecceddcc3ea9e59ae28b0d0641cbcf19e2d0205f5eaad2
Mandriva Linux Security Advisory 2010-133
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-133 - Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file. Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.

tags | advisory, remote, denial of service, overflow, arbitrary, memory leak
systems | linux, mandriva
advisories | CVE-2008-6218, CVE-2010-1205, CVE-2010-2249
SHA-256 | 9dbcdb392f0269d231a9304f120b56317d9400add78640b2d61a8c8ee985f7fc
ORACLE BPM Process Administrator Cross Site Scripting
Posted Jul 16, 2010
Authored by Markot | Site corelan.be

Oracle Business Process Management suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bf912910410508689aa486e3ff80bc7660b173926d3a4e50e64cecd7fa49c84a
Mandriva Linux Security Advisory 2010-136
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-136 - Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter. As a precaution ghostscriptc has been rebuilt to link against the system libpng library which was fixed with MDVSA-2010:133 The updated packages have been patched to correct this issue.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2010-1628
SHA-256 | 9fe83cb142b2975efe8bfd4f0a6a6b22652cf1016190aea60be397f92ce3eedd
Packet Fence 1.9.0
Posted Jul 16, 2010
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: This release has 64 bit support, new hardware support from Cisco, Foundry, HP, and SMC, and a new node categorization feature. It has improved error handling, improved documentation, performance improvements, improved error reporting, and many other things.
tags | tool, remote
systems | unix
SHA-256 | 969b91e8ae1584524affb646ad128ef521ce5bf00f9f6f60159e8b58da5d0f07
Mandriva Linux Security Advisory 2010-135
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-135 - Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-4270
SHA-256 | dbbb7d1d19b0686c9fe07d480902056754e2254f4fda8cce0b3486a5646179bf
Novell Groupwise Webaccess Stack Overflow
Posted Jul 16, 2010
Authored by Francis Provencher

Novell Groupwise Webaccess suffers from a remote code execution vulnerability due to a stack overflow.

tags | exploit, remote, overflow, code execution
SHA-256 | 6bc927bbb103ea68af6dfe0fd79afd57d34dc381ac12eaba2cd72d5a86b363a1
BS Script Directory SQL Injection
Posted Jul 16, 2010
Authored by D4rk357

BS Script Directory suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a696baaa4461363bbdfb309cbfbe2cf949c7b57d9f355ef4f657a36d38589b12
USBsploit Proof Of Concept
Posted Jul 16, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept for dumping files from remote USB drives on multiple targets at the same time. It works through Meterpreter sessions with a light (24MB) modified version of Metasploit. The interface is a modified version of SET. usbsploit.rb can also be used with the original Metasploit Framework.

tags | exploit, remote, proof of concept
SHA-256 | e92fea9e4a548bffde34146916cb0c63e949368dc79238ba26fd55cf55ebefd4
OpenSCAP Libraries 0.6.0
Posted Jul 16, 2010
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, and CVSS.

Changes: A high level OVAL API was added. Integration of OVAL in XCCDF_POLICY was improved. OVAL variables are supported. A new Python API was introduced. OVAL and XCCDF schemas are included. Validation and cvss support were added to oscap tool.
tags | protocol, library
SHA-256 | 2cc66d02ccbce04e3af3f2eda1456ab508b96f53fd147bf3d51007b1817d9f4c
Joomla RedShop 1.0.23.1 Blind SQL Injection
Posted Jul 16, 2010
Authored by Salvatore Fresta

The Joomla RedShop component version 1.0.23.1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6a410d169270349d16863cca3f0fe83a7b3432240ed1e845fda1b51715882733
Whizzy CMS 10.01 Local File Inclusion
Posted Jul 16, 2010
Authored by Anarchy Angel

Whizzy CMS version 10.01 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 966b682a7f3367f3eda499decf9119a83e159fe30e13be8d36cf52f8b0a2da96
eXtreme Message Board 1.9.11 Cross Site Request Forgery
Posted Jul 16, 2010
Authored by 10n1z3d

eXtreme Message Board version 1.9.11 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 1ec13a5785d62586b4ea280109e9cf79c4c6799a19cc94ae3d441317eca7055c
phpwcms 1.4.5 Cross Site Request Forgery / Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

phpwcms version 1.4.5 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 238c56be1149a2c41b7fe7cceb9e99be0c1302dde6f41931bc36aebbefbea36b
Taggon CMS 01.07.2010 Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Taggon CMS version 01.07.2010 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ad97ce47a7e5d219507b16996ff44446c20e8d44024851fae44eb60fdc4ed35d
Pligg 1.0.4 Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Pligg version 1.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0ccea23e91cfc6e8ab73421bd8017b31faabc11de48e7fff06b641f2781adcd5
Gekko Web Builder 0.90 ALPHA Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Gekko Web Builder version 0.90 ALPHA suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 85af3cfd14353783a98a7cfc2080d999b4986ceff50d83d0342674e5b13dcd8a
DSite CMS 4.81 Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

DSite CMS version 4.81 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc953e49422823dd791c120c04686610e46c46dc850c76d9a77b99f4e871ca3e
FestOS 2.3b Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

FestOS version 2.3b suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5072788f0a975e013a92c56a4f477514c864cede4ce09dab59f8f0eee27714d5
Pixie 1.0.4 Cross Site Request Forgery / Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Pixie version 1.0.4 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | dceea5fdc604cfa13b2a99efd6480667ccb25c0ed09befcd91ecdf6106c73483
WebPress 01.07.2010 Cross Site Scripting
Posted Jul 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

WebPress version 01.07.2010 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 15d63968d4bbaf83b2097e2d73e8bb895a81a7232adf709e79981c250ef3979a
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close