exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files Date: 2010-01-22 to 2010-01-23

VP-ASP SQL Injection / Cross Site Scripting
Posted Jan 22, 2010
Authored by CodeScan Labs

VP-ASP suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, xss, sql injection, asp
SHA-256 | 03144e9c7692da406834dc7e125ff0f52a6114f18f5370f2ff5026b33c71728d
Zero Day Initiative Advisory 10-06
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-06 - This vulnerability allows remote attackers to execute code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a user must open a malicious file or visit a malicious web site. The specific flaw exists during the parsing of GIF files with forged chunk sizes. The player uses values from the file improperly when allocating a buffer on the heap. An attacker can abuse this to create and then overflow heap buffers leading to arbitrary code execution in the context of the currently logged in user.

tags | advisory, remote, web, overflow, arbitrary, code execution
advisories | CVE-2009-4242
SHA-256 | 3fce3b61a72c4ec2153f507559b7bb6126220250160813ce7c41e41b43f2eb93
cPanel HTTP Response Splitting
Posted Jan 22, 2010
Authored by Trancer

cPanel and WHM versions 11.25 (up to build 42174) allows CR injection that can be leveraged for HTTP response splitting attacks.

tags | exploit, web
SHA-256 | 0b670ad065f6c4108376593723c9a29dc3176ab42c972663cc916ea7c24106a6
Mandriva Linux Security Advisory 2010-022
Posted Jan 22, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-022 - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_free_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct thies issue.

tags | advisory, remote, web, denial of service, cryptography, php, memory leak
systems | linux, mandriva
advisories | CVE-2009-4355
SHA-256 | 5fab82dded984f2d28a43ce0b364ecbb0af960fb9cd65d21a63b32da93c43922
RadASM 2.2.1.5 .mnu Local Unicode Overflow
Posted Jan 22, 2010
Authored by SkuLL-HacKeR

RadASM version 2.2.1.5 .mnu file local unicode overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | a1288cd5958514bec6542dd8a9b0f2d9fbfe1b0a3b4766fcb20e68ed2092c684
Zero Day Initiative Advisory 10-05
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-05 - This vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must open a malicious file or visit a malicious web site. The specific flaw exists during the parsing of files with improperly defined ASMRuleBook structures. A controllable memory allocation allows for an attacker to corrupt heap memory. Attacker controlled data from the corrupt heap is later used as an object pointer which can be leveraged to execute arbitrary code in the context of the currently logged in user.

tags | advisory, remote, web, arbitrary
advisories | CVE-2009-4241
SHA-256 | 5c6d1cc062494d8ea73b5a3732915836b9f6fb7683508db4b25f1456392114cb
Zero Day Initiative Advisory 10-04
Posted Jan 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-04 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco CiscoWorks Internetwork Performance Monitor. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of CORBA GIOP requests. By making a specially crafted getProcessName GIOP request an attacker can corrupt memory. Successful exploitation can result in a full compromise with SYSTEM credentials.

tags | advisory, remote, arbitrary
systems | cisco
advisories | CVE-2010-0138
SHA-256 | 67b1ac7c04e0e6edafe009f1aaeb1b1ea8eb95fc4b6f17009ed557c3bb4034cf
Debian Linux Security Advisory 1975-1
Posted Jan 22, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1975-1 - One year after the release of Debian GNU/Linux 5.0 alias 'lenny' and nearly three years after the release of Debian GNU/Linux 4.0 alias 'etch' the security support for the old distribution (4.0 alias 'etch') is coming to an end next month.

tags | advisory
systems | linux, debian
SHA-256 | 25113a03e29016ad5a216cedc8f90b92213057d1bf2ace2361a58e3d6d22e07f
OpenX 2.6.1 SQL Injection
Posted Jan 22, 2010
Authored by AndySoon

OpenX version 2.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0fc96d5c1a7a329f4f8f5d1c96d2bc72f039be74c4621bed8149a1a3b9415fbc
Oracle TNS Listener AUTH_SESSKEY Buffer Overflow.
Posted Jan 22, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Oracle. When sending a specially crafted packet containing a long AUTH_SESSKEY value to the TNS service, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-1979
SHA-256 | e9967e777e3c8fe58c92669e0506711f78d2e29ac497889ccf38191214de029e
HP OpenView Network Node Manager ovalarm.exe CGI Buffer Overflow
Posted Jan 22, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.53. By sending a specially crafted CGI request to ovalarm.exe, an attacker can execute arbitrary code. This specific vulnerability is due to a call to "sprintf_new" in the "isWide" function within "ovalarm.exe". A stack buffer overflow occurs when processing an HTTP request that contains the following. 1. An "Accept-Language" header longer than 100 bytes 2. An "OVABverbose" URI variable set to "on", "true" or "1" The vulnerability is related to "_WebSession::GetWebLocale()" .. NOTE: This exploit has been tested successfully with a reverse_ord_tcp payload.

tags | exploit, web, overflow, arbitrary, cgi
advisories | CVE-2009-4179
SHA-256 | e54d42cfbc8bbc738ef568c5e491af71d30811bb7fa5db456ba682b823955033
Page 3 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close