exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 60 RSS Feed

Files Date: 2010-10-15 to 2010-10-16

VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in various Oracle products. The vulnerability is caused by a buffer overflow error in the EM Console when processing overly long HTTP requests, which could allow remote unauthenticated attackers to crash an affected service or execute arbitrary code via a malicious request.

tags | advisory, remote, web, overflow, arbitrary
advisories | CVE-2010-2390
SHA-256 | 9e1e95823a442b573f228d2e9e6bd2a907960053f76b541aaf8b568c97a6e0ac
HP Security Bulletin HPSBGN02589 SSRT100296
Posted Oct 15, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBGN02589 SSRT100296 - A potential security vulnerability has been identified in HP ProCurve Access Points, Access Controllers, and Mobility Controllers. The vulnerability could be remotely exploited resulting in a privilege escalation. Revision 1 of this advisory.

tags | advisory
SHA-256 | 1f9255e4bef71f3a1f3304ed925cd83e8c5a953340ed2f441eae5ac75f8bdba4
Data/File Upload And Management Shell Upload
Posted Oct 15, 2010
Authored by saudi0hacker

Data/File Upload and Management suffers from a shell upload vulnerability.

tags | exploit, shell, file upload
SHA-256 | d4ca0291002bab0c5074a82306ab0e121ef107c3c752597a200975f73078bad9
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by an input validation error when processing certain elements in a Ghost record, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3242
SHA-256 | d6d6390958f92ed07b4d2c5e15709f7fef6986c9aa26a8f34895fff6fa8a4354
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a memory corruption error when processing certain structures in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3241
SHA-256 | f327f64d4ad3765c91e02905d2e170ad44625a785126eb2a47408a86a1f75273
Gmail JSON Hijacking Proof Of Concept
Posted Oct 15, 2010
Authored by 80vul | Site 80vul.com

Gmail JSON hijacking proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | e29da0ce5d93b75b7ab2abf0e1ff62828137d9490550d776944f2ff038620363
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by an array indexing error when processing RealTimeData records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3240
SHA-256 | b0394ee0714f4a34f6b77d22e6092fa129ef3339828fc4d78a16e527c76d1e80
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a memory corruption error when processing PtgExtraArray structures in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3239
SHA-256 | e19af2ec0d3533567d3a32477534781cf0b32cb325b298813a4c7f68630e574c
Microsoft Internet Explorer 8 Cross Domain
Posted Oct 15, 2010
Authored by 80vul | Site 80vul.com

Microsoft Internet Explorer 8 suffers from a CSS cross-domain information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 2a8dfd52220f78635a0faf5930687642174313682c3a87ca8fabf1bf45c9145f
Netgear CG3100D Residential Gateway Privilege Escalation
Posted Oct 15, 2010
Authored by Alejandro Alvarez Bravo

The Netgear CG3100D Residential Gateway suffers from multiple bypass vulnerabilities that allow for privilege escalation.

tags | exploit, vulnerability
SHA-256 | fc6235aa4f028ef06046b5a00203fcf2b6c847bd5c4aaba421f0fbac687bb523
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a memory corruption error when processing a negative future function while parsing an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3238
SHA-256 | 60861b81f80faa96ebf71b0e4feafa3d933e780e764da294d28e82b3a3d8b8bf
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by an invalid pointer when processing malformed Merge Cell records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3237
SHA-256 | 3119190982fe54a39aca06a34de7455412077534acde935d581e338f5cc88cb0
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by an array indexing error when processing certain records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3236
SHA-256 | 7fe69e73e5b9a2dcbc7934bd67a9787b1b6728b3c3cb7099f0deb3b18e3ddcfa
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a dangling pointer when processing certain Formula records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3235
SHA-256 | f45d18bff402a84ec127606ed71c3e215d68aad73e735a753adb18a2c89d1340
HP Security Bulletin HPSBMA02590 SSRT100182
Posted Oct 15, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02590 SSRT100182 - A potential security vulnerability has been identified in HP Systems Insight Manager (SIM) for HP-UX, Linux, and Windows. The vulnerability could be exploited remotely to download arbitrary files. Revision 1 of this advisory.

tags | advisory, arbitrary
systems | linux, windows, hpux
advisories | CVE-2010-3286
SHA-256 | 328cc19e6114abb823cfc7e339cf15839afa88950a1c7767db6d3bf3e56294c7
HP Security Bulletin HPSBPI02398 SSRT080166 6
Posted Oct 15, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBPI02398 SSRT080166 6 - A potential security vulnerability has been identified with certain HP LaserJet printers, HP Color LaserJet printers and HP Digital Senders. The vulnerability could be exploited remotely to gain unauthorized access to files. Revision 6 of this advisory.

tags | advisory
advisories | CVE-2008-4419
SHA-256 | e177121ed35456ca393055abe22203897c5b5c288a4d44954f2b201e511afcef
Ease Jukebox 1.30 Denial Of Service
Posted Oct 15, 2010
Authored by Sweet

Ease Jukebox version 1.30 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 5931555f3fe6f3fb69cb308d20056575584d541e8facc82f91885a904831063a
USBsploit 0.3b
Posted Oct 15, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept that will generate Reverse TCP backdoors (x86, x64, all ports) and malicious LNK files. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET. The Meterscript script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

tags | tool, x86, tcp, proof of concept
systems | unix
SHA-256 | 4384a2387af66f5dc6cba17362270fc36c04e950b9973e6a7fabee05b3bfa38a
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a memory corruption error when parsing Formula Substream records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3234
SHA-256 | a840ba3e65f9384d17d00a10223ca54bcd95ae3df4a850ba142552b66906113c
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Excel. The vulnerability is caused by a buffer overflow error when parsing Formula records in an Excel file, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Excel document.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-3231
SHA-256 | 62124a28b6d6782280dc4420c3f6f6aecba5bf44cecc5677eb70030926d60c00
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by a memory corruption when parsing certain data in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3221
SHA-256 | 6f605a94866beb2d7e61953b8b8b2c368d2f75d0b1f997c1fd71c03fd1b9db1c
Xlrstats 2.0.1 SQL Injection
Posted Oct 15, 2010
Authored by Sky4

Xlrstats versions 2.0.1, 2.0.2 and 2.0.3 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d380ed8282cd907f961e37744b7cfc00761911bc4394d3ffb5f9be01ae4ea137
Stadtaus Voting 1.9.1 Remote File Inclusion
Posted Oct 15, 2010
Authored by Dracula

Stadtaus Voting version 1.9.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 98dcea323a1a4bcc4ecfd46f5f876e9178e43e42b52a8711b15231360c13c4a6
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by a heap overflow error when processing LVL structures in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-3220
SHA-256 | bb74d0d766f0270b9b87c02ab5f5390ef28efd02610d0b1145c30e50cfe149c7
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by an array indexing error when processing BKF objects in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3219
SHA-256 | 8b09cfc9c65f858f69e4206bdf31934990f7ae24ed2d5359b974b960d2705145
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close