what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files

Insomnia Security Vulnerability Advisory 110427.2
Posted Apr 27, 2011
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - One of the pages included in the admin interface of Up.time Systems Management software contains a function designed to set the administrator password when the interface is loaded for the first time. After this task has been completed the code which processes this request is left in the page. By sending a specially crafted request a remote attacker can abuse this functionality to bypass the servers authentication mechanism and reset the password for any account.

tags | advisory, remote
SHA-256 | 6c9f9fe29a5db7bd0c9e35ad56265abf778b16ff07e28d1298796b7d1a51ecf2

Related Files

Insomnia Security Vulnerability Advisory 110822.1
Posted Aug 22, 2011
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - An insecure URL handling vulnerability exists in Pidgin versions 2.9.0 and below that can be exploited to cause remote code execution. This vulnerability requires user interaction in the form of clicking a malicious crafted URL.

tags | advisory, remote, code execution
SHA-256 | 78f433609701f4f1da1ce29a348a9c690cd4095e97081d3ac07d88c61cd8c42f
Secunia Security Advisory 44345
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Insomnia Security has reported a vulnerability in 7-Technologies Interactive Graphical SCADA System, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7083a0ec78588fad991fb51a632aa10454d3252b0c4809f91b05e45a4354f921
Insomnia Security Vulnerability Advisory 110427.1
Posted Apr 28, 2011
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - The ODBC service component of IGSS listens on port 20222/tcp by default. The application layer protocol runs over TCP and reads an initial packet that specifies the amount of data to follow. A second read then takes place and the data is copied into a variable length buffer. Next the data is parsed and during this process a buffer overflow occurs on the stack. At minimum this vulnerability leads to denial of service though remote code execution may be possible.

tags | advisory, remote, denial of service, overflow, tcp, code execution, protocol
SHA-256 | 9b00196dabcaf93182f5a536e6c2c63ee2b1c359b79ac0f8472802f7bb57d00f
Insomnia Security Vulnerability Advisory 100730.1
Posted Aug 3, 2010
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - EasyManage Content Management System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e5becb2b8475b0b2f94b2eb2b5bbdeb1104541b5cbec60eb630f4d3514ae6443
Insomnia Security Vulnerability Advisory 100216.1
Posted Feb 16, 2010
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - A flaw exists with the handling of malformed URL's passed through the ShellExeute() API in Microsoft Windows. The vulnerability does not directly cause an issue within Windows itself however, applications that call the flawed API may be vulnerable to various attacks, one of which is shown in this report.

tags | advisory
systems | windows
SHA-256 | 39f5ed63255f91f74bafeb10491b25db0ff238ff227c677e96fd690e0beceae1
Insomnia Security Vulnerability Advisory ISVA-081209.1
Posted Dec 10, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - A vulnerability was found in the way that webdav requests are cached and then later retrieved by Internet Explorer. This results in the use of uninitialized memory which under the right situation can lead to command execution.

tags | advisory
SHA-256 | 0ebee2503764c3f44cce43818618fb05a3255230042be4a70fb22d4b93f6b573
ISVA-081020.1.txt
Posted Oct 21, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - The Altiris Deployment Server Agent in Altiris Deployment Server 6.X suffers from a privilege escalation vulnerability.

tags | advisory
SHA-256 | ad4df9326b88cc8114e907561c055aaa21aa5a4cccfa765a54aeb3b200530a40
ISVA-080910.1.txt
Posted Sep 10, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - Microsoft Office OneNote suffers from a URL handling vulnerability.

tags | advisory
SHA-256 | cd5c05fc129fad5e01ad13fafee248da86bca40d183785e3fddc3dc796468b18
ISVA-080709.1.txt
Posted Jul 10, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - Microsoft SQL Server contains a buffer overflow that can be reached by causing the server to attempt a database restore from a corrupt back file.

tags | advisory, overflow
SHA-256 | 5a50603e65e5b46c0ff831ce59e84e01f0f7a9d8c6723e48eb9d86453a08b703
ISVA-080516.2.txt
Posted May 20, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - Altiris deployment solution listens for connections from the Altiris client on port 402. It is possible to make a request to this port that will result in the encrypted domain credentials being returned. Versions 6.8.x and 6.9.x are affected.

tags | advisory
SHA-256 | 234df1762e5efb593ef96dd70a17ec44fe21692085b54ea3770decbd5d36aeb3
ISVA-080516.1.txt
Posted May 20, 2008
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - Altiris deployment solution listens for connections from the Altiris client on port 402. It is possible to make a request that will result in the exploitation of a SQL Injection vulnerability. This leads to database access under the context of the Deployment server, which typically then allows, command execution under the context of the SQL Server. Versions 6.8.x and 6.9.x are affected.

tags | advisory, sql injection
SHA-256 | 326d2fd0343a50acde785461329cd29f99ec31a55cf0fdeda6e4172d09fb8bbf
Page 1 of 1
Back1Next

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close