exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2011-05-25 to 2011-05-26

Secunia Security Advisory 44624
Posted May 25, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 24d75a35bd99792c5bb5f6c42f555c400b7c615f4dcd4e062acc0239c006a87d
Secunia Security Advisory 44666
Posted May 25, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sybase EAServer, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 9fdebd8da410072bf3051645d1ff1f0650b65933c715cd625b37ad8a0a3a41ae
7T Interactive Graphical SCADA System Memory Corruption
Posted May 25, 2011
Authored by Sebastien Renaud, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in 7T Interactive Graphical SCADA System (IGSS). The vulnerability is caused by a memory corruption error in the Open Database Connectivity (ODBC) component when processing packets sent to port 20222/TCP, which could result in an invalid structure being used, leading to an exploitable condition. Versions prior to 9.0.0.11143 are affected.

tags | advisory, tcp
SHA-256 | 6e3832447425985a6f696ebb91be8820ba8801500741d4b2775eba9c6ee8f8c7
ExtCalendar 2.0b2 SQL Injection
Posted May 25, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

ExtCalendar version 2.0b2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a974fb64b525dccafa700ae21ce599ff3b55f0bc16632feaf5ecc4351c58d005
Ubuntu Security Notice USN-1133-1
Posted May 25, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1133-1 - Nelson Elhage discovered that Econet did not correctly handle AUN packets over UDP. Dan Rosenberg discovered that the OSS subsystem did not handle name termination correctly. Dan Rosenberg discovered that IRDA did not correctly check the size of buffers. Dan Carpenter discovered that the TTPCI DVB driver did not check certain values during an ioctl.

tags | advisory, udp
systems | linux, ubuntu
advisories | CVE-2010-4342, CVE-2010-4527, CVE-2010-4529, CVE-2011-0521, CVE-2011-0711
SHA-256 | f80525e1f6c53abd390c72048278ff14463feb1c085eae156af3756b8d02500a
Mandriva Linux Security Advisory 2011-100
Posted May 25, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-100 - The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a plaintext command injection attack, a similar issue to CVE-2011-0411.

tags | advisory, imap
systems | linux, mandriva
advisories | CVE-2011-1926
SHA-256 | dcd2c353c81c889d6b3ed40ee816336b07c372c37a756dfb0601d4a306195143
Joomla Shop SQL Injection
Posted May 25, 2011
Authored by ThunDEr HeaD

The Joomla Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5c1c7436095eb4f29d0aa7816ab894e560cc003e2fd802174240f3410ba875fc
Gadu-Gadu Code Execution / Cross Site Scripting
Posted May 25, 2011
Authored by Kacper Szczesniak

Gadu Gadu suffers from code execution and cross site scripting vulnerabilities.

tags | exploit, vulnerability, code execution, xss
SHA-256 | 612de9e01fb3921205f432c253275a1342b0c96c78cbdfaa821e87c81d36a69e
MidiCMS-WB 2011 Shell Upload / Local File Inclusion
Posted May 25, 2011
Authored by KedAns-Dz

MidiCMS-WB 2011 suffers from shell upload and local file inclusion vulnerabilities.

tags | exploit, shell, local, vulnerability, file inclusion
SHA-256 | 208ae1ecbeafba74477bec78c0fe421408df5ffb73b5d5c458d19fba8d13b108
Lumension Device Control Memory Corruption
Posted May 25, 2011
Site ngssecure.com

Lumension Device Control (formerly Sanctuary) versions 4.4 SR6 and below suffer from a remote memory corruption vulnerability.

tags | advisory, remote
SHA-256 | 1caa94de7a31ba6b7b07d67b405eeea35b0ad409884b1159f43029ba918c7e59
Mandriva Linux Security Advisory 2011-099
Posted May 25, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-099 - The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service via an empty ZIP archive that is processed with a statName operation.

tags | advisory, denial of service, php
systems | linux, mandriva
advisories | CVE-2011-0421
SHA-256 | 5f56bbf1927d311d0b7613020b373344a22acb4b5c91e1e99cedd55648e42362
phpScheduleIt 1.2.12 Cross Site Scripting
Posted May 25, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

phpScheduleIt version 1.2.12 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5db247863aca225f49b9243807c5dc59e5a3bc6b60f4f9d1fa36ad4b3787f23a
Ajax Chat 1 Cross Site Scripting
Posted May 25, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Ajax Chat version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7c4c8b263ac25b470d2fcc65c9497d70fa344da56160fcef220629ef9e0be30c
NNT Change Tracker Enterprise 4.7 Weak Encryption
Posted May 25, 2011
Authored by Dennis Brunnen

NNT Change Tracker Enterprise version 4.7 suffers from a weak encryption vulnerability.

tags | advisory
SHA-256 | bb9cfa0dea1ecbb9aaa1f7f61253d99bceada83c9b55f2a9d67b79ffc1f7d419
VisiWave VWR File Parsing Buffer Overflow
Posted May 25, 2011
Authored by mr_me, TecR0c | Site metasploit.com

This Metasploit module exploits a vulnerability found in VisiWave's Site Survey Report application. When processing .VWR files, VisiWave.exe attempts to match a valid pointer based on the 'Type' property (valid ones include 'Properties', 'TitlePage', 'Details', 'Graph', 'Table', 'Text', 'Image'), but if a match isn't found, the function that's supposed to handle this routine ends up returning the input as a pointer, and later used in a CALL DWORD PTR [EDX+10] instruction. This allows attackers to overwrite it with any arbitrary value, and results code execution. This Metasploit module was built to bypass ASLR and DEP. NOTE: During installation, the application will register two file handle's, VWS and VWR and allows a victim user to 'double click' the malicious VWR file and execute code.

tags | exploit, arbitrary, code execution
advisories | OSVDB-72464
SHA-256 | 3771df4f4d30f18e8cb453cb8d601bc178761d31e4917dee0ed0a0b741354001
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close