exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 72 of 72 RSS Feed

Files Date: 2010-10-13 to 2010-10-14

Zero Day Initiative Advisory 10-198
Posted Oct 13, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-198 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of an Embedded OpenType file to TrueType format within t2embed.dll. The most likely vector for this to be exploited is via Internet Explorer as an embedded font in an HTML/CSS document. The flaw itself is due to an integer overflow when parsing hdmx records. A record size and record count variable are trusted and operated upon. The resulting value is used in a copy loop that can be manipulated to corrupt memory. This can be abused by an attacker to execute remote code under the context of the user running the browser.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2010-1883
SHA-256 | 41b2d3623f987f94395fd8d827f83baafafad75741207120b73e6727ed7c352b
Zero Day Initiative Advisory 10-197
Posted Oct 13, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-197 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the function CAttrArray::PrivateFind as defined in mshtml.dll. If a specific property of a stylesheet object is set, the code within mshtml can be forced to free an object which is subsequently accessed later. This can be leveraged by an attacker to execute remote code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3328
SHA-256 | 2387cc74cdd24639c4bfbc6cd8700fa21a5ce57456be968b5d0391c310f06710
Zero Day Initiative Advisory 10-196
Posted Oct 13, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-196 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability. The specific flaw exists within the JobServer.exe process which listens by default on several TCP ports above 1024. When parsing a GIOP request, the process trusts a user-supplied 32-bit value and allocates a buffer on the heap. The process then proceeds to copy the string following this value from the packet until it finds a NULL byte. By crafting a specifically sized packet a remote attacker can overflow the buffer and gain code execution under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, tcp, code execution
SHA-256 | 80519d1176f668b97d5351241e10afe4ae48c247f5791653fe0cf549669a5ec0
Zero Day Initiative Advisory 10-195
Posted Oct 13, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-195 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CMS.exe process which listens by default on several TCP ports above 1024. When parsing a GIOP request, the process trusts a user-supplied 32-bit value and allocates a buffer on the heap. The process then proceeds to copy the string following this value from the packet until it finds a NULL byte. By crafting a specifically sized packet a remote attacker can overflow the buffer and gain code execution under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, tcp, code execution
SHA-256 | fa7fbecef96bbb03c86a891c96b6076c63e3bc3e7d58ecdd69da0376b7afdb7d
Sydbox Sandbox 0.7.1
Posted Oct 13, 2010
Authored by Ali Polatel | Site projects.0x90.dk

Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.

Changes: This release removes the EFAULT hack for path arguments now that pinktrace is fixed. It uses pinktrace\'s API to decode -terminated string arrays for execve(). It requires pinktrace 0.0.3.
tags | tool
systems | unix
SHA-256 | 3d3b1e6deb3121ed662c9c2e28c4c2978af601998bb2a04f48080daf45d82358
Collabtive 0.65 Cross Site Request Forgery / Cross Site Scripting
Posted Oct 13, 2010
Authored by Anatolia Security

Collabtive version 0.65 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 031f92e41c5512da4359c0e8ea7c09681b35088d32ef7b5e2dda89595148b032
WikiWebHelp 0.3.3 Cross Site Request Forgery
Posted Oct 13, 2010
Authored by yoyohack

WikiWebHelp version 0.3.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | d8eb58fcfe99ffe8c65950fa7b5974a5050aee4f4ced6b692c09c81dc2eca1b3
FTPGetter Standard v3.55.0.05 Stack Buffer Overflow (PWD)
Posted Oct 13, 2010
Authored by corelanc0d3r, ekse | Site metasploit.com

This Metasploit module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. When processing the response on a PWD command, a stack based buffer overflow occurs. This leads to arbitrary code execution when a structured exception handler gets overwritten.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 507a7c5e70085f277792ad74cc751f09fe88331f586a25388882a96cdbebbda9
Seagull FTP v3.3 build 409 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Seagull FTP client that gets triggered when the ftp clients processes a response to a LIST command. If the response contains an overly long file/folder name, a buffer overflow occurs, overwriting a structured exception handler.

tags | exploit, overflow
SHA-256 | 9941cb1e0eab82770705bd52bcc11e247b265de2b6214cf38bf56899f9ca66c6
Gekko Manager FTP Client Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r, nullthreat | Site metasploit.com

This Metasploit module exploits a buffer overflow in Gekko Manager ftp client, triggered when processing the response received after sending a LIST request. If this response contains a long filename, a buffer overflow occurs, overwriting a structured exception handler.

tags | exploit, overflow
SHA-256 | 1e7f04091422e546c4e127b6c53345bff8d018725ad5fe1491c13b5f22f5072d
FTPPad 1.2.0 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r | Site metasploit.com

This Metasploit module exploits a stack buffer overflow FTPPad 1.2.0 ftp client. The overflow is triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ sniper was needed to make this one work.

tags | exploit, overflow
SHA-256 | 864c13b0bca680072f94df1e362ce6bb00e5d2748d610e1cebd0c43a1709a476
Odin Secure FTP 4.1 Stack Buffer Overflow (LIST)
Posted Oct 13, 2010
Authored by Rick, corelanc0d3r | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Odin Secure FTP 4.1, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.

tags | exploit, overflow
SHA-256 | 8ecb75c11b4c62e6ce7b842e1892561eaa88009d5a9d93ecdf9fc5bde92a10b0
FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r, myne-us | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro version 4.0.73.274 The overflow gets triggered by sending an overly long filename to the client in response to a LIST command. The LIST command gets issued when doing a preview or when you have just created a new sync profile and allow the tool to see the differences. This will overwrite a structured exception handler and trigger an access violation.

tags | exploit, overflow
SHA-256 | 78e1f3656a2efea50a4734c1a2d624b7be11f7525cd7f612e7e4f77465473ac0
LeapFTP 3.0.1 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r, nullthreat | Site metasploit.com

This Metasploit module exploits a buffer overflow in the LeapFTP 3.0.1 client. This issue is triggered when a file with a long name is downloaded/opened.

tags | exploit, overflow
SHA-256 | f8abfdd204f0ed82b2f476dc9dc0ef13d8d0f1fd66773b87636bd55e7ccf5da4
FileWrangler 5.30 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r, nullthreat | Site metasploit.com

This Metasploit module exploits a buffer overflow in the FileWrangler client that is triggered when the client connects to a FTP server and lists the directory contents, containing an overly long directory name.

tags | exploit, overflow
SHA-256 | 95851d121dac72f5b67123647939012f5eb8f8288e71b4bf2e3aba8b78359ec8
AASync v2.2.1.0 (Win32) Stack Buffer Overflow (LIST)
Posted Oct 13, 2010
Authored by corelanc0d3r | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in AASync v2.2.1.0, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.

tags | exploit, overflow
SHA-256 | 8b62f6ce5d0c462f21a4d8c332b770f40f0683dc9cebbc9d6a3825b998832d01
32bit FTP Client Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r, fancy | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in 32bit ftp client, triggered when trying to download a file that has an overly long filename.

tags | exploit, overflow
SHA-256 | 12a0acd3b85279ca0f783e238d8bda5078df822aab5d81ee1c2c190dce51d449
FTPShell 5.1 Stack Buffer Overflow
Posted Oct 13, 2010
Authored by corelanc0d3r | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in FTPShell 5.1. The overflow gets triggered when the ftp clients tries to process an overly response to a PWD command. This will overwrite the saved EIP and structured exception handler.

tags | exploit, overflow
SHA-256 | f519ce182ff34cf63de5ac4b785653619bb701dd2e8f49ec8d3eeefccfe0e84a
Nuance PDF Reader v6.0 Launch Stack Buffer Overflow
Posted Oct 13, 2010
Authored by Rick, corelanc0d3r | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Nuance PDF Reader v6.0. The vulnerability is triggered when opening a malformed PDF file that contains an overly long string in a /Launch field. This results in overwriting a structured exception handler record. This exploit does not use javascript.

tags | exploit, overflow, javascript
SHA-256 | 7126b3b381c830c246515407ec24713960237606057c8a16a5129cdc22151571
Generic Web Application Unix Command Execution
Posted Oct 13, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module can be used to exploit any generic command execution vulnerability for CGI applications on Unix-like platforms. To use this module, specify the CMDURI path, replacing the command itself with XXcmdXX. This Metasploit module is currently limited to forms vulnerable through GET requests with query parameters.

tags | exploit, cgi
systems | unix
SHA-256 | 6c2b3fd36348c68b1b7315cd8846caabd0b02376ccf79d5cacc3caa7d16db23a
AdaptCMS 2.0.1 Beta Remote File Inclusion
Posted Oct 13, 2010
Authored by v3n0m

AdaptCMS version 2.0.1 Beta suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 7a06d9bfcb143c28a7a447419277a922309ac29fda7a7ced24d5ec8c6abb78e6
Disk Pulse Server 2.2.34 Buffer Overflow
Posted Oct 13, 2010
Authored by xsploited Security

A vulnerability exists in the way Disk Pulse Server version 2.2.34 process a remote client's "GetServerInfo" request. The vulnerability is caused due to a boundary error in libpal.dll when handling network messages and can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 9120.

tags | exploit, remote, overflow, tcp
SHA-256 | 702797dbe6d5419910ba57e07ca0672c234f8c8fd8f21cb8293adbf04f2202a2
Page 3 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close