exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

OX Documents 7.10.5 Improper Authorization
Posted Jul 20, 2021
Authored by Martin Heiland

OX Documents version 7.10.5 suffers from multiple improper authorization vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2021-28093, CVE-2021-28094, CVE-2021-28095
SHA-256 | fdc415c0e1479fc1bbd7c9da23f2c1893080132040e14750beb56328b7efaa61

Related Files

IS-IS Cheatsheet
Posted Mar 12, 2010
Authored by Jeremy Stretch | Site packetlife.net

IS-IS cheatsheet that documents NSAP addressing, the protocol header, and more. Version 2.0.

tags | paper, protocol
SHA-256 | c144b803463d2f8beaf7175bf909fad90e6bc2bdebaa1e3abe313c33524f4f67
iDEFENSE Security Advisory 2010-03-04.1
Posted Mar 5, 2010
Authored by iDefense Labs, Joshua J. Drake | Site idefense.com

iDefense Security Advisory 03.04.10 - Remote exploitation of an integer overflow vulnerability in Autonomy's KeyView Filter SDK allows attackers to execute arbitrary code with the privileges of the targeted application. This vulnerability occurs when processing specially crafted documents. When processing such a document, the software reads an integer value from the file and uses this integer, without validation, in an arithmetic operation to calculate the amount of memory to allocate. If a sufficiently large number is supplied, the calculation overflows, resulting in a buffer of insufficient size being allocated. The software then proceeds to copy data into this under-sized buffer. This results in an exploitable heap buffer overflow condition.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-3032
SHA-256 | 9a38749723b857cb3e896aba20e2a23b58f974d6729609fcebae71db896a4859
Joomla Remote File Inclusion Paper
Posted Mar 5, 2010
Authored by Mr.aFiR | Site aFiR.me

This paper documents approximately 50 remote file inclusion vulnerabilities in Joomla and related components.

tags | paper, remote, vulnerability, code execution, file inclusion
SHA-256 | 8a5d92efdfd15123d6ad869d4c6c3d04d04313918ae5fffeaf1cd2c0d2e807fa
Ubuntu Security Notice 903-1
Posted Feb 25, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 903-1 - OpenOffice suffers from multiple vulnerabilities. It was discovered that the XML HMAC signature system did not correctly check certain lengths. If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation. If a user were tricked into opening a specially crafted image, an attacker could execute arbitrary code with user privileges. Nicolas Joly discovered that OpenOffice did not correctly handle certain Word documents. If a user were tricked into opening a specially crafted document, an attacker could execute arbitrary code with user privileges. It was discovered that OpenOffice did not correctly handle certain VBA macros correctly. If a user were tricked into opening a specially crafted document, an attacker could execute arbitrary macro commands, bypassing security controls.

tags | advisory, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-0217, CVE-2009-2949, CVE-2009-2950, CVE-2009-3301, CVE-2009-3302, CVE-2010-0136
SHA-256 | d0a5d9315dd8e403cd8b3e519b8802f52fab3266e43dcc3d765e96967c414897
Secunia Security Advisory 38410
Posted Feb 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Documents Seller component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 36f4029c6e6392aa5cad6924a4441ec1b5301f663a4aa6aae3af6fe0971d157b
HMS HICP Modification / Intellicom NetBiterConfing.exe Stack Overflow
Posted Dec 15, 2009
Authored by Ruben Santamarta | Site reversemode.com

This advisory documents vulnerabilities in the HMS HICP protocol as well as an Intellicom NetBiterConfing.exe remote stack overflow vulnerability. Proof of concept code included.

tags | exploit, remote, overflow, vulnerability, protocol, proof of concept
SHA-256 | 568bd797eaf1f7ed214afde142e6f10f82177d14ce3e3f83f9c7be7f09b32e90
3Com 3CDaemon 2.0 FTP Username Overflow
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a vulnerability in the 3Com 3CDaemon FTP service. This package is being distributed from the 3Com web site and is recommended in numerous support documents. This Metasploit module uses the USER command to trigger the overflow.

tags | exploit, web, overflow
advisories | CVE-2005-0277
SHA-256 | 815045260e465802c35cbda9285c0622bfe5f32298f8df68633b64d3f5a3b2a0
MaxDB WebDBM GET Buffer Overflow
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in the MaxDB WebDBM service. This service is included with many recent versions of the MaxDB and SAPDB products. This particular module is capable of exploiting Windows systems through the use of an SEH frame overwrite. The offset to the SEH frame may change depending on where MaxDB has been installed, this module assumes a web root path with the same length as: C:\\Program Files\\sdb\\programs\\web\\Documents

tags | exploit, web, overflow, root
systems | windows
advisories | CVE-2005-0684
SHA-256 | ddfaa8c6118e77caf9e117e63cda2d90418cbdc78f05a4580f53a23a6e6acf0d
PDFResurrect PDF Analyzer 0.9
Posted Nov 17, 2009
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: This is a bugfix release and addresses the gathering of data (within limit) for the Creator MetaData at the end of a PDF. The previous version would stop prematurely, or possibly get too much information (in certain cases).
tags | tool, forensics
SHA-256 | a0ff0a8ec79bf6713fe5bd669e6ff55f9916ec2d34e69f219fc8a3fcb182a836
Ubuntu Security Notice 850-3
Posted Nov 3, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 850-3 - USN-850-1 fixed vulnerabilities in poppler. This update provides the corresponding updates for Ubuntu 9.10. Original advisory details: It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-3603, CVE-2009-3604, CVE-2009-3607, CVE-2009-3608, CVE-2009-3609
SHA-256 | 63c3ccfbae71b61e42605e0cd81a7cff6e1cf05926b86d413a70fe812affcec3
Debian Linux Security Advisory 1923-1
Posted Oct 30, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1923-1 - A denial of service vulnerability has been found in libhtml-parser-perl, a collection of modules to parse HTML in text documents which is used by several other projects like e.g. SpamAssassin.

tags | advisory, denial of service, perl
systems | linux, debian
advisories | CVE-2009-3627
SHA-256 | 9f1818d3726640fc83c9bc282de4c5ec25b1509a4b848c6a2dd32c8de7c5aaf4
McAfee Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various McAfee products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | 74ef4730aa72a94a3d6fb571ee56a4ae27ce295cced8e9dca51ce6c1107da9f3
F-Secure Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various F-Secure products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | 9f02651ae92071b892771f844ff0763ef40c20e6cfbe5d8fad99e50e0bae8ead
Symantec Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various Symantec products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | c5195c92e8b5682c7ce5d732aadf8cc4e11df997abb11873f6eaa932099bcaa0
Ubuntu Security Notice 850-2
Posted Oct 23, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 850-2 - USN-850-1 fixed vulnerabilities in poppler. The security fix for CVE-2009-3605 introduced a regression that would cause certain applications, such as Okular, to segfault when opening certain PDF files. This update fixes the problem. It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-3605
SHA-256 | 2cf3d8acd59c9223beedc1f2cefbcb79dea982230a631fe717af3cb4e1cb518f
Ubuntu Security Notice 850-1
Posted Oct 21, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 850-1 - It was discovered that poppler contained multiple security issues when parsing malformed PDF documents. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0755, CVE-2009-3603, CVE-2009-3604, CVE-2009-3605, CVE-2009-3607, CVE-2009-3608, CVE-2009-3609
SHA-256 | 2f82b6f88a4cf4427aa354e47da6d119543a06f31b58f73dfeef3c7d9b2a663b
iDEFENSE Security Advisory 2009-10-13.2
Posted Oct 14, 2009
Authored by iDefense Labs, Elazar Broad | Site idefense.com

iDefense Security Advisory 10.13.09 - Remote exploitation of a use after free vulnerability in Adobe Systems Inc.'s Acrobat and Reader Firefox plugin could allow an attacker to execute arbitrary code with the privileges of the current user. When Adobe Acrobat/Reader is installed, it also installs various browser plugins that allow PDF documents to be viewed in the browser. This vulnerability occurs within the Firefox browser plugin. The Internet Explorer version is not affected. The vulnerability occurs when Firefox attempts to navigate away from a page and unload the PDF viewing plugin. When Firefox calls the plugin's destroy method, the plugin does not properly free its resources. Specifically, a function pointer for the window update routine is not properly freed. This results in uninitialized memory being used when the window is redrawn, which leads to attacker supplied data being executed when the function pointer is dereferenced. iDefense has confirmed the existence of this vulnerability in Acrobat and Reader versions 8.1.3, 8.1.4, 8.1.5, and 8.1.6. Previous versions are also likely affected. Version 9.1.3 and previous 9.x versions are not affected.

tags | advisory, remote, arbitrary
advisories | CVE-2009-2991
SHA-256 | 26d2526e5fa4a158dc90e307c84a2c19f9b708a1d9689add295e4f768fab5f65
Origami PDF Exploit Creator 1.0.0
Posted Oct 8, 2009
Authored by Frederic Raynal, Guillaume Delugre | Site security-labs.org

origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

Changes: This version 1.0.0-beta1 (released while at HITB) comes up with the ability to forge documents with more graphical contents.
tags | tool, ruby
systems | unix
SHA-256 | 03d625dd6742e83e1cf1e7aada8ac8204c837386922d724032600a741c8dd32d
Secunia Security Advisory 36796
Posted Sep 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BPowerHouse BPLawyerCaseDocuments, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3d9ed4b113f911b8d5bef0307d833a44bd4322ce258e97797f6986ac2af710b3
PDFResurrect PDF Analyzer 0.8
Posted Sep 11, 2009
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: This is a bugfix release. A indefinite stall would occur if a trailer for linearized PDF could not be found. This case is probably because the PDF is using xref streams.
tags | tool, forensics
SHA-256 | 267e613adcd2e4def5a8b399243921d9e748a1b9c49c328a68a4fff6c8882117
PDFResurrect PDF Analyzer 0.7
Posted Sep 10, 2009
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: This version deals with linearized PDFs and adds the (-i) option to report "creator" information about the document. Creator information in the newer XML metadata stream format is not handled.
tags | tool, forensics
SHA-256 | ad97a700df805201f0faf0f1f0121a46a4839f54351997009d49262a8e3e0f46
XSS Workaround For strip_tags And addslashes
Posted Aug 26, 2009
Authored by Inj3ct0r | Site Inj3ct0r.com

This paper documents a cross site scripting workaround for strip_tags and addslashes.

tags | paper, xss
SHA-256 | 7aa842a76e4ec47865c611db68a692cad7db17b86333f2d6fba41e17ca13aff2
Origami PDF Exploit Creator
Posted Jul 9, 2009
Authored by Frederic Raynal, Guillaume Delugre | Site security-labs.org

origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

tags | tool, ruby
systems | unix
SHA-256 | 7405bfc439b78efdaa51fa0a0e50f65ec3a0fa667d5346b12c0813e56d269d1f
Ubuntu Security Notice 779-1
Posted Jun 15, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-779-1 - Several flaws were discovered in the browser and JavaScript engines of Firefox. Pavel Cvrcek discovered that Firefox would sometimes display certain invalid Unicode characters as whitespace. Gregory Fleischer, Adam Barth and Collin Jackson discovered that Firefox would allow access to local files from resources loaded via the file: protocol. Shuo Chen, Ziqing Mao, Yi-Min Wang, and Ming Zhang discovered that Firefox did not properly handle error responses when connecting to a proxy server. Wladimir Palant discovered Firefox did not check content-loading policies when loading external script files into XUL documents. It was discovered that Firefox could be made to run scripts with elevated privileges.

tags | advisory, local, javascript, protocol
systems | linux, ubuntu
advisories | CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841
SHA-256 | 4b1fdb412e2b54dca514e5aa57046f7901ab30c8d647f187151e3f4ccaf6738c
PDFResurrect PDF Analyzer 0.6
Posted May 24, 2009
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: No bugs were fixed. Some additions were made to the build system and a man page was added, but no tool functionality additions were made. The AUTHORS file was added. The install, uninstall, distclean, and .phony targets in Makefile.in were added or modified.
tags | tool, forensics
SHA-256 | cf35a2dbcc6076011b5ad1bf115619a109832b123bfa84ba7d96cdbb3dba42cf
Page 3 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close