what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 54 RSS Feed

Files Date: 2011-06-14 to 2011-06-15

Zero Day Initiative Advisory 11-197
Posted Jun 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-197 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within vgx.dll while parsing VML objects from the DOM. Specifically, the faulty code exists while handling imagedata parameters during page deconstruction. By dynamically assigning an attribute to an imagedata object the process can be made to access freed memory. Successful exploitation can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-1266
SHA-256 | e2f1a3a67c17f194c6025045c038c7029db3ca08cadcd0779e6653bc302261c0
Zero Day Initiative Advisory 11-196
Posted Jun 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-196 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet Explorer handles HTTP 302 redirects to CDL protocols. When Internet Explorer tries to determine who is responsible for handling the protocol redirect it fails to keep a correct reference counter to a Transaction object which results in a use-after-free vulnerability. This can be leveraged into remote code execution under the context of the current user.

tags | advisory, remote, web, arbitrary, code execution, protocol
advisories | CVE-2011-1262
SHA-256 | 1b80106373d399e571e8963c7684587d924b8b47515440acc04b445a6cd4a1a1
Zero Day Initiative Advisory 11-195
Posted Jun 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-195 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet explorer handles the javascript statement 'selection.empty' during certain onclick events. By causing a particular sequence of events, an attacker can cause a CDisplayObject to be freed while it is still in use. This results in an operation on previously freed memory that can be utilized to achieve remote code execution.

tags | advisory, remote, arbitrary, javascript, code execution
advisories | CVE-2011-1261
SHA-256 | c4549c31717a307d16873d67c9fb3a0dd94acb7857939ab51301a143ecd946f8
Zero Day Initiative Advisory 11-194
Posted Jun 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-194 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet Explorer handles unusual values for the layout-grid-char style property. Specific values may result in the destruction of a tree node that is still in use during the rendering of the HTML page. The resulting use-after-free vulnerability can be leveraged to achieve remote code execution.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-1260
SHA-256 | e66ab6e34ab6238db402bf9848f12cc239fbc897c52696492d594c2d9caf51e9
Zero Day Initiative Advisory 11-193
Posted Jun 14, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-193 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application handles multiple javascript modifications to the document. In certain instances the application will free an object due to a modification and then later access it again when attempting to destroy it. This re-use can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, javascript, code execution
advisories | CVE-2011-1256
SHA-256 | 839e2cd49a21be940524e3a7df7f41bf7c85996c640fd80b762e9820a8b2873d
Debian Security Advisory 2260-1
Posted Jun 14, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2260-1 - Two vulnerabilities were discovered in Ruby on Rails, a web application framework.

tags | advisory, web, vulnerability, ruby
systems | linux, debian
advisories | CVE-2009-3086, CVE-2009-4214
SHA-256 | 393e0d36ccbed8ff1c5830a32f65306af4d797f52757615b801f2a287e96475b
HP Security Bulletin HPSBMA02627 SSRT090246 2
Posted Jun 14, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBMA02627 SSRT090246 2 - A potential vulnerability has been identified with HP OpenView Performance Insight Server. The vulnerability could be exploited remotely to execute arbitrary code. Revision 2 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2011-0276
SHA-256 | 45c49adfe687d668c11eb1396dd1eaa518786d3e124fcd8beacfef5d478d3738
Infopublica Solutions SQL Injection
Posted Jun 14, 2011
Authored by RoAd_KiLlEr

Infopublica Solutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 96883a882fa9a9d86380171a96ad677d61721fa56762bf54a327ccd9d402bfe2
vBulletin 3.x.x vBTube 1.2.9 Cross Site Scripting
Posted Jun 14, 2011
Authored by Mr.ThieF

vBulletin version 3.x.x with the vBTube version 1.2.9 add-on suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e7f22f85242668c8be470d27ff17b6110ad159892ef6a775b8c5c662c0fc2ff9
Windows Media Player With K-Lite CODEC Pack Denial Of Service
Posted Jun 14, 2011
Authored by Nicolas Krassas

Proof of concept denial of service exploit for Windows Media Player with the K-Lite CODEC pack.

tags | exploit, denial of service, proof of concept
systems | linux, windows
SHA-256 | 26133347e03447d3d2e2d73f9d6939ab76ee3ad49c5cfc96136f6cbc5bc695f8
CubeCart 2.0.7 Cross Site Scripting / SQL Injection
Posted Jun 14, 2011
Authored by Shamus

CubeCart version 2.0.7 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 988a9c3a3598b0fae75a81847ac6d209b66747f1353950e522e2dca81f228937
Secunia Security Advisory 44930
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for java-1_6_0-sun. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), compromise a user's system, and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
SHA-256 | 131a226ef1297b6563d6668c7347b71da24ddd8baaf67701e8e3905e62e7a030
Secunia Security Advisory 44935
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for openssl. This fixes a weakness, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
systems | linux, suse
SHA-256 | f939068babff2ea4ab3d9c2610a51e0abf8c88c654745a99e0924fbdd4670566
Secunia Security Advisory 44914
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 8b9b10990d9a832346d777efc7b662dd2cc74b525044cfadac154efd08b7ff19
Secunia Security Advisory 44857
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Forefront Threat Management Gateway (TMG) Client, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 38f22090922eea3a2b322d7efda7cf72e82cb8c837e65d57b04d675550bba548
Secunia Security Advisory 44892
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | d2a48b656597dc5ca5ad5cfb6748bcb2255e19f3dbf279df0f6cfd76bfb0eb36
Secunia Security Advisory 44912
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft XML Editor, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 06c6b385010a8992521088a0d65318b74e4defa90bac3a6cb98d8ad6369567a8
Secunia Security Advisory 44912
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft XML Editor, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 06c6b385010a8992521088a0d65318b74e4defa90bac3a6cb98d8ad6369567a8
Secunia Security Advisory 44899
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft .NET Framework, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | e6a31972de0731bd05ef967bead43b7ebfde051cbc7cfbb2f617fb22d8963870
Secunia Security Advisory 44893
Posted Jun 14, 2011
Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

SHA-256 | cab300a8ea4039b53514f0229f2c8099c77c327391d4b527dd94a5a74cb67416
Secunia Security Advisory 44948
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows
SHA-256 | 6bddfa0b7d706e3fa73ceea169fd82d50897296c2c0677639f9723686b395f4f
Secunia Security Advisory 44841
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft .NET Framework and Silverlight, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | d479bf5af75706bbed6beb2200f03d10d1c1a9c4db6f7c1baf97baf25937e4a9
Secunia Security Advisory 44931
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 36db7d3cce47d9aa6c2fc3ba470da61a350abf6a4dd12f39ce79e5dc2259b1f7
Secunia Security Advisory 44893
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | cab300a8ea4039b53514f0229f2c8099c77c327391d4b527dd94a5a74cb67416
Secunia Security Advisory 44907
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | ca3b6b59c869a85659b28992d30be9e08f332acd5af9c44b5a032f1670b65489
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close