exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2011-03-23 to 2011-03-24

Adobe Flash Player AVM Bytecode Verification
Posted Mar 23, 2011
Authored by bannedit | Site metasploit.com

This Metasploit module exploits a vulnerability in AVM2 action script virtual machine used in Adobe Flash Player versions 9.0 through 10. The AVM fails to properly verify bytecode streams prior to executing it. This can cause uninitialized memory to be executed. Utilizing heap spraying techniques to control the uninitialized memory region it is possible to execute arbitrary code. Typically Flash Player is not used as a standalone application. Often, SWF files are embedded in other file formats or specifically loaded via a web browser. Malcode was discovered in the wild which embedded a malformed SWF file within an Excel spreadsheet. This exploit is based off the byte stream found within that malcode sample.

tags | exploit, web, arbitrary
advisories | CVE-2011-0609
SHA-256 | 42f45f3260ab9c5b8cc16ebc8f87909c47dfc836d8362769726a745db24e2709
HP NNM CGI webappmon.exe execvp Buffer Overflow
Posted Mar 23, 2011
Authored by sinn3r, Shahin | Site metasploit.com

This Metasploit module exploits a buffer overflow in HP NNM's webappmon.exe. The vulnerability occurs when function "execvp_nc" fails to do any bounds-checking before strcat is used to append user-supplied input to a buffer.

tags | exploit, overflow
advisories | CVE-2010-2703, OSVDB-66514
SHA-256 | bf5a083c853de0a9689a85f8964a561ceaf21211433507a6060dcd2fcafba338
HP OpenView NNM nnmRptConfig nameParams Buffer Overflow
Posted Mar 23, 2011
Authored by sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability in HP NNM's nnmRptConfig.exe. A remote user can send a long string data to the nameParams parameter via a POST request, which causes an overflow on the stack when function ov.sprintf_new() is used, and gain arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2011-0266
SHA-256 | 8399adbc5106cbe36645f0c2d9c78118462b9640526de98fe7e579d71bc51419
HP NNM CGI webappmon.exe OvJavaLocale Buffer Overflow
Posted Mar 23, 2011
Authored by Nahuel Riva, sinn3r | Site metasploit.com

This Metasploit module exploits a stack-based overflow in HP NNM's webappmon.exe. The vulnerability occurs when a long string of data is sent as OvJavaLocale's cookie value, OvWww.dll fails to properly do any bounds checking before this input is parsed in function OvWwwDebug(), which causes an overflow when sprintf_new() is called.

tags | exploit, overflow
advisories | CVE-2010-2709, OSVDB-66932
SHA-256 | ec5c964f51636ce7ba31b28775d66861ded19652e6b8966cbb73d25ac422b9da
ClamSAP Libraries 0.9.7
Posted Mar 23, 2011
Authored by Markus Strehle | Site clamsap.sourceforge.net

ClamSAP consists of two C shared libraries that link between ClamAV and the Virus Scan Interface (VSI) of SAP (official name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads, for example.

Changes: Adaptations for ClamAV 0.97. Prevents multiple byte code initialization.
tags | web, virus
systems | unix
SHA-256 | 79f8fbe155a786d4d2f0925c98ddf63776ec0b2fa26df80b3911060b92cba64d
Creepy Geolocation Gathering Tool 0.1.92
Posted Mar 23, 2011
Authored by Yiannis Kakavas | Site ilektrojohn.github.com

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Changes: This released fixed a bug in location retrieval through foursquare that caused errors in the coordinates retrieved. A function was added for removing duplicate locations from the presented list.
tags | tool
systems | unix
SHA-256 | 0e5adce9f91374b6688e81f0e3e198ec204c04022086d5ac3e977f73a29283e8
Oracle fcgi-bin/echo Cross Site Scripting
Posted Mar 23, 2011
Authored by Paul Szabo

Oracle web server installations with fcgi-bin/echo suffer from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 876ccd422be21e22190e6a2ef52166aa0a13d89638cc8bd6d07d521630c33e6d
Libc sigqueue() Function TGKILL si_code Spoof
Posted Mar 23, 2011
Authored by Julien Tinnes

Libc's sigqueue() function has not been updated to mitigate spoofing of the TGKILL si_code. Because of this, userland is unable to trust the pid and uid information of a TKILL signal.

tags | advisory, spoof
SHA-256 | da60bcd9f8399fae09da3a1f99b2b0a7f2508fe1068f4bbb527f9eba681e9a05
Debian Security Advisory 2198-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2198-1 - Mathias Svensson discovered that tex-common, a package shipping a number of scripts and configuration files necessary for TeX, contains insecure settings for the "shell_escape_commands" directive. Depending on the scenario, this may result in arbitrary code execution when a victim is tricked into processing a malicious tex-file or this is done in an automated fashion.

tags | advisory, arbitrary, code execution
systems | linux, debian
advisories | CVE-2011-1400
SHA-256 | 564f9351c85c330d2c5bf614132230874365c687d2f1b6c2f240daa055e5eb34
Secunia Security Advisory 42254
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Achievo, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 9f460aeefab97d7930b38d59c5debfb8bac65a09ff68de7e30839f4f02ac52f3
Secunia Security Advisory 43839
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for dbus. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, redhat
SHA-256 | 3b71c3c383509daf4ead11dc7b53156be9a4f4ffb598f471d769ebe3c361e3b9
Secunia Security Advisory 43852
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, suse
SHA-256 | 75d7fd230f6a97e4b48ddc8c21066b36fa73e6e8b7a1045621b28a7b414512c5
Secunia Security Advisory 43816
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tex-common. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 5d3b409ff79e4104a5faf352dd5efac51a2441d174b81e20671425bdd6c0dd79
Secunia Security Advisory 43857
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NGS Secure Research has reported a vulnerability in Immunity Debugger, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 9f1650b52db9e5e6dba5b42ef13c82b515c05d2e378f11e565cfd00ac10da882
Secunia Security Advisory 43856
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | 25e74e88287a459b23f752e72865e531c29a201095bad02df8c13321d661f7ac
Secunia Security Advisory 43815
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities with an unknown impact have been reported in Pligg CMS.

tags | advisory, vulnerability
SHA-256 | 64ae1d77e34c0bb502b9d15be3d0bedf8c80150632c4e63e95b861394bc91267
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close