exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 56 RSS Feed

Files Date: 2010-11-05 to 2010-11-06

Mandriva Linux Security Advisory 2010-221
Posted Nov 5, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-221 - OpenOffice.org software suffers from multiple issues. Multiple vulnerabilities was discovered and corrected in the Integer overflow allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow. Heap-based buffer overflow allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression. Integer underflow allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted sprmTDefTable table property modifier in a Word document. Other issues have also been addressed.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2949, CVE-2009-2950, CVE-2009-3301, CVE-2009-3302, CVE-2010-0136, CVE-2010-0395, CVE-2010-2935, CVE-2010-2936
SHA-256 | bb6f46286a72a84c458eca1873c1c7efbe0c464e0a3e8b3716ddaed8dd11f869
Joomla CCInvoices SQL Injection
Posted Nov 5, 2010
Authored by Fl0riX

The Joomla CCInvoices component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 107e71ca53698e85c280e41ebf454c43108da062553ecfe0e96701b1c0653916
Joomla AutoArticles 3000 Blind SQL Injection
Posted Nov 5, 2010
Authored by jos_ali_joe

The Joomla AutoArticles 3000 component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e2d62bfd66ec42c7c7d4c6908b12323d913475d02cfc2dbc987f03f0ed7438d7
10 Reasons Why Corsair Flash Padlock 2 Can Be Cracked
Posted Nov 5, 2010
Authored by Tomas Harvie Mudrunka

Whitepaper called 10 reasons why Corsair Flash Padlock 2 CAN be cracked.

tags | paper
SHA-256 | e3f57bb8836fe8b84b076446d4d683151c609df9338bcaab3627bf1a6c8f6b90
Filefuzzer Denial Of Service
Posted Nov 5, 2010
Authored by Sweet

Filefuzzer suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | d2abe32ba8304026c557c83cd0c8c0e69faed11a138039ca40c1db8e5af45409
Sami HTTP Server 2.0.1 Denial Of Service
Posted Nov 5, 2010
Authored by wingthor

Sami HTTP Server version 2.0.1 GET request denial of service exploit.

tags | exploit, web, denial of service
SHA-256 | bc52d2ef9cbce7a16f55fb01284f7e1d213ad0561bbbd58edcf6ad7cfd0ee207
Android 2.0 / 2.1 Reverse Shell Exploit
Posted Nov 5, 2010
Authored by MJ Keith

Android versions 2.0 and 2.1 reverse shell exploit that leverages a Webkit code execution vulnerability.

tags | exploit, shell, code execution
advisories | CVE-2010-1807
SHA-256 | ca7e564b996ea8d4e79eba624213b79c24b2fb410c46a701053eed24c16deac9
Cisco Unified Communications Manager Privilege Escalation
Posted Nov 5, 2010
Authored by Knud | Site nsense.fi

nSense Vulnerability Research Security Advisory - Cisco Unified Communications Manager contains a setuid binary which fails to validate command line arguments. A local user can leverage this vulnerability to gain root access by supplying suitable arguments to the binary.

tags | exploit, local, root
systems | cisco
advisories | CVE-2010-3039
SHA-256 | 7753a39b108bbf87882e557edf6889f7527b71f82f2ad3c34860d2be9f3bdf91
Angel LMS 7.3 Cross Site Scripting
Posted Nov 5, 2010
Authored by Wesley Kerfoot

Angel LMS version 7.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4b22fc325c1ab0ee2026b22ef9b21c3acdfb2fbcaa598fe8d124e8858031d402
DDOSIM - Layer 7 DDoS Simulator 0.2
Posted Nov 5, 2010
Authored by Adrian Furtuna | Site sourceforge.net

DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server).

tags | tool, web, tcp
systems | unix
SHA-256 | 5b6ceb2e406a4aaf113dc796925048a2c426eaa7c5bb1ad5e4336c85a5ce5a1b
ACROS Security Problem Report 2010-11-05.01
Posted Nov 5, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-11-05-01 - A binary planting vulnerability in Adobe Flash Player for local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3976
SHA-256 | 20d4011cacea1a5e897650169d0a521c09da2450f7b2ee46be82b6edd78f5903
Swiss Cyber Storm 3 Car Giveaway
Posted Nov 5, 2010
Authored by Ivan Buetler | Site swisscyberstorm.com

Swiss Cyber Storm 3 Security Conference is giving away a brand new car to the best hacker at their Wargames.

tags | paper, conference
SHA-256 | 75447375b1c89665094441357cf7ae59d38b0e6950f059d097d0ba739d0ff0f9
Various Routers Password Disclosure
Posted Nov 5, 2010
Authored by Daniel Teixeira

Various routers such as the AirLive ARM-204, AirLive WT-2000ARM, D-Link DVA-G3170i/PT, Edimax AR-7084ga, Huawei, Aolynk DR814Q, DrayTek Vigor2700 series, DrayTek Vigor2920 series, Thomson TG784, and ZyXEL P-660RU-T1v3 re-embed the password in a hidden field of the web management interface.

tags | advisory, web, info disclosure
SHA-256 | c834792f6018eb0bbf413092b9ac178bde5b3dfba17992207e84bbb00f34d14c
Adobe Flash Player Remote Memory Corruption
Posted Nov 5, 2010
Authored by XiaoPeng Zhang | Site fortinet.com

Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Flash Player (Flash10h.ocx), which may lead to arbitrary code execution or denial of service.

tags | advisory, denial of service, arbitrary, code execution
advisories | CVE-2010-3637
SHA-256 | 2379d0956f41f634170262c1ad6b0bd1627e2f42e33e8672b58ba11c665de83a
Secunia Security Advisory 41784
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Rational Quality Manager and Rational Test Lab Manager, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | 1f0d2af06aedc140aa47ec7fde75063bc6d2c3b7d545707c55b125558f867bbe
Secunia Security Advisory 42133
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | c35a5de1d169cc22a91f124bd90d40583fa970c3ddb8f117c0cacacaa0d014a9
Secunia Security Advisory 42148
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information.

tags | advisory, kernel, local
systems | linux
SHA-256 | 09861a9754394c918d42229c7f079b2b5c6d9873541db1c458a74082101a2cd7
Secunia Security Advisory 42117
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in GSPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | de24d1679875c5894b5c830bdef9d53259fbdef53b1add8efbf47879afed4721
Secunia Security Advisory 42095
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe Reader, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 8df1ca8d9ae566792f6cc9e7be2ae11af65d8fd660fcb97642465852a0bd1653
Secunia Security Advisory 42097
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MySQL, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 675c38d4c34650b68c2343bbd9317dd345c731b8b68e1cf26974bc5fffabad4f
Secunia Security Advisory 42113
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Red Hat Conga, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
SHA-256 | f7c23d6122fd4ced141d85a67fb86e7bee552f5af43e1c2be3617dc30ce6b3ca
Secunia Security Advisory 42121
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service),

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 63cec1d8f628ccacabb84218014be972d16ab39220df24ffccd7c70092a97865
Secunia Security Advisory 42101
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Zen Cart, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | a96491778cb76d9801ddb9f8db7359a86ed0833fa4f73d9bb2a00960b4ab0898
Secunia Security Advisory 42122
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetSupport Manager, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 742ad45f572db44b140319bd21b9efebe7aec71fa363060eb4ab81dd85c7e1e9
Secunia Security Advisory 42102
Posted Nov 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions or to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 17da0bb507291c855370b4d522c206a3569030f14b60025287015d303327213f
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close