exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2012-01-12 to 2012-01-13

NTR ActiveX Control StopModule() Input Validation
Posted Jan 12, 2012
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.

tags | advisory, arbitrary, activex
advisories | CVE-2012-0267
SHA-256 | f4c7913670d60302279ef9cbc25fdd9fd7774592fda24b75eade05cc79505853
Kayako Support Suite 3.70.02-stable Cross Site Scripting
Posted Jan 12, 2012
Authored by Alexander Zaitsev | Site ptsecurity.com

Kayako Support Suite versions 3.70.02-stable and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6388220ce5746c5f193fc985d52fcbfe5756c33f0e4edf0d648f11ec4782914a
Debian Security Advisory 2386-1
Posted Jan 12, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2386-1 - Several vulnerabilities have been discovered in openttd, a transport business simulation game. Multiple buffer overflows and off-by-one errors allow remote attackers to cause denial of service.

tags | advisory, remote, denial of service, overflow, vulnerability
systems | linux, debian
advisories | CVE-2011-3341, CVE-2011-3342, CVE-2011-3343
SHA-256 | 89ffbdaf53b14fe0439e9c22227cb8009a53bf7d105aaf64978807486e3c3283
NTR ActiveX Control Four Buffer Overflows
Posted Jan 12, 2012
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.

tags | advisory, overflow, activex
advisories | CVE-2012-0266
SHA-256 | 749b21b3ffb4706107fa23982681c9002436ae13b7acd96089e1d8988fdcb778
KnowledgeTree 3.7.0.2 Cross Site Scripting
Posted Jan 12, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

KnowledgeTree versions 3.7.0.2 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9b21d08924793bac2204804fbdd650236a47ac861a6be6886c4da1df63af2bd3
Red Hat Security Advisory 2012-0018-01
Posted Jan 12, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0018-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-3905, CVE-2011-3919
SHA-256 | 345d81a1fa63ea7c70fd504a3e3e0e8f3843c34ad996db6b7180e9c9fe1bccdf
Kayako Support Suite 3.70.02 Information Disclosure
Posted Jan 12, 2012
Authored by Alexander Zaitsev | Site ptsecurity.com

Kayako Support Suite versions 3.70.02-stable and below suffer from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 20084ddbb8a2ff6cf4d0dd2b7998c8b3d15c75f515922a64130b7664c8af010e
Kayako Support Suite 3.70.02 PHP Code Execution
Posted Jan 12, 2012
Authored by Alexander Zaitsev | Site ptsecurity.com

Kayako Support Suite versions 3.70.02-stable and below suffer from a PHP code execution vulnerability.

tags | exploit, php, code execution
SHA-256 | e47bcffce88a53a2a7b03acfb49fe193a2593ffc314a44126c1c3664d1a16d33
Microsoft Security Bulletin Re-Release For January, 2012
Posted Jan 12, 2012
Site microsoft.com

This bulletin summary lists two re-released Microsoft security bulletins for January, 2012.

tags | advisory
SHA-256 | 8166c2fc14d931bf4e778e6f7616fee0030a45c7475187aa3c6a3ec5b521737e
Red Hat Security Advisory 2012-0017-01
Posted Jan 12, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0017-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language, which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2010-4008, CVE-2011-0216, CVE-2011-1944, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
SHA-256 | 8de1cd5c934d9caf3a341c7d1360226ec9cec6a4e744aa685fb458b3ca5d0e5d
Site By Electric Pulp Web Site SQL Injection
Posted Jan 12, 2012
Authored by KatiLhacker

Site By Electric Pulp Web Site suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | e43d15b084cbad04ae2f4b43fbb2ca84d83747ae15390f4e1b371f4b2a3f344a
V3 Yazilim Web Site SQL Injection
Posted Jan 12, 2012
Authored by KatiLhacker

V3 Yazilim Web Site suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 508c3b9445d3fd9d4dff7f15d345e75df55fcb0a34450453aa920de378eaa2e4
WordPress Blog Cross Site Scripting
Posted Jan 12, 2012
Authored by d3v1l, RandomStorm

The administrative panel for WordPress Blog on WordPress.com suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 87662fc54e7b6298ff08f7317f1a8410dcbb4c6454b35404b18429d6ada48103
Red Hat Security Advisory 2012-0016-01
Posted Jan 12, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0016-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language, which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
SHA-256 | 71b1b4d3d81db6a48e2542cb538a368109f00aa37b462e9dc5d8f5e0f3f2b184
Kayako Support Suite 3.70.02-stable Cross Site Scripting
Posted Jan 12, 2012
Authored by Yuri Goltsev | Site ptsecurity.com

Kayako Support Suite versions 3.70.02-stable and below suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | e751861febf25fae1e2a8f5aa2948adcee16ff4744ed3ba2b9c80b55c1699005
Adobe Acrobat / Reader Image Processing Integer Overflow
Posted Jan 12, 2012
Authored by Nicolas Joly, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Acrobat and Reader. The vulnerability is caused by an integer overflow error when processing malformed image data within a PDF document, which could be exploited by attackers to compromise a vulnerable system by tricking a user into opening a specially crafted PDF file. Versions affected include Adobe Acrobat and Reader X (10.1.1) and prior and Adobe Acrobat and Reader 9.4.7 and prior.

tags | advisory, overflow
SHA-256 | c94c13dce309f884bd280837f2c98fd26f4a3b8efdb37192552ad693c35c02fe
x3cms 0.4.3 Cross Site Scripting
Posted Jan 12, 2012
Authored by Stefan Schurtz

x3cms version 0.4.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f80eeb545377860098d25ac7287e64c8d8c6c3ef75b691270770e21650ef3843
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close