exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 1,192 RSS Feed

Files Date: 2012-06-01 to 2012-06-30

Secunia Security Advisory 49529
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported two vulnerabilities in web@all, which can be exploited by malicious people to conduct cross-site request forgery and scripting attacks.

tags | advisory, web, vulnerability, csrf
SHA-256 | f4bd4e96008d5b6ac8f832713290429b1255863db618986ff70ab112bceee662
Secunia Security Advisory 49726
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in WordPress, which can potentially be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 15be7cde33a8db9ada8895b84d2495a90bb972719503744d7123465457b7f815
Secunia Security Advisory 49599
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, redhat
SHA-256 | 9590d5ca316bcde9bdb940de278eae44de6672a62a157a3334a72a2b13e7dcca
Secunia Security Advisory 49750
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in WebEx Recording Format Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 66c516ffae04ad2a578953355a9cb64003715abf209faf304d945f80e1c21449
Secunia Security Advisory 49751
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WebEx Advanced Recording Format Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2ffdb1b79f6350a6b1c59f73fc4db5995a244069b27644ae7fa8ed71ce83bd10
Secunia Security Advisory 49668
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Integrated Information Core, where some have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | cd27edde6cd85413bf8781b815a1b0670f0cbba1090f388be591bab4be7a61af
Secunia Security Advisory 49756
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the Job Manager plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 7af47828ffe2a74c460a3c167ab441ff957e3aba0bf449ef81b03a8ea322543e
Cisco Security Advisory 20120627-webex
Posted Jun 28, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains four buffer overflow vulnerabilities and the Cisco Advanced Recording Format (ARF) player contains one buffer overflow vulnerability. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and WRF and ARF players to address these vulnerabilities.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | cisco
SHA-256 | 49478116b2c8fce99cb338023910fed9c83a1ea261b069618c93a071ffc72472
Zero Day Initiative Advisory 12-105
Posted Jun 28, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-105 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within he way Quicktime handles Text Track Descriptors. Values for almost all of the text descriptors recognized by quicktime will be read into a fixed size buffer. This can lead to a heap based buffer overflow which can result in remote code execution under the context of the current process.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
advisories | CVE-2012-0664
SHA-256 | dbf5f7b5d2c56a334d965efc1089ddc6773033fa814118e2b2ade2ce11d35611
Zero Day Initiative Advisory 12-104
Posted Jun 28, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-104 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP NetWeaver ABAP. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way SAP NetWeaver handles packages with opcode 0x43. If a package with sub opcode 0x4 contains a long parameter value string NetWeaver will eventually write a \x00 byte onto the stack to mark the end of the string. The location of this null byte is dependent on user supplied data and the resulting stack corruption can lead to remote code execution under the context of the running process.

tags | advisory, remote, arbitrary, code execution
SHA-256 | eabbee78d8eade63ec066cd6d6608ab4a06b4c1ef10668b60197c14c5b8086e8
Zero Day Initiative Advisory 12-103
Posted Jun 28, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-103 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw occurs when parsing a movie file containing multiple atoms with a different string length. When resizing a buffer in order to make space for the string, the application will forget to include the null-terminator. When the application attempts to null-terminate the string, an out-of-bounds write will occur. If an aggressor can place the a useful heap buffer contiguous to the reallocated string, this can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-3459
SHA-256 | f1c0ec875d5f1f6611aaccba87f70c3dded4662ef965ecfd7279dddd6300d5f0
Zero Day Initiative Advisory 12-102
Posted Jun 28, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-102 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required in that a target must visit a malicious page or open a malicious file. The flaw exists within the exposed GetDriverSettings method in the nipplib component imported by ienipp and npnipp. When encountering a realm parameter this user supplied value's length is not properly verified before copying into a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.

tags | advisory, remote, arbitrary
advisories | CVE-2011-4187
SHA-256 | dad2278a888a8b86768114f8246f8e419ae73d969cf93902e9da0f392a230cc8
Zero Day Initiative Advisory 12-101
Posted Jun 28, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The flaw exists within the tm1admsd.exe component. This process listens on TCP port 5498 by default. Requests to the service include a request type field, a data length field, and a data field. Multiple request types (opcodes) fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the system.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2012-0202
SHA-256 | 948d1a63f76e7397259aaddc98b7c87f1d5c6ecaaaaa72a571270335007c2ac7
Hook Analyser Malware Tool 2.0
Posted Jun 28, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: This is a major release with improved static analysis functionality, a nice fingerprinting feature, improvements on modules, and more.
SHA-256 | 40872e53db04f39bca6a732865f07e2f6c917473b1e6b14b9b3cf3270a04df6d
Chiangrai Enter Soft Design SQL Injection
Posted Jun 28, 2012
Authored by 3spi0n

Chiangrai Enter Soft Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e301577863b80f8afebc3fab0af02f6a7bc28c1cefa52659a270e1b1dd1244eb
Proper Password Hashing
Posted Jun 28, 2012
Authored by bwall, drone | Site ballastsec.blogspot.com

Ballast Security felt the need to write this paper as almost countless services that we trust with our passwords are handling them irresponsibly. This is a good read for anyone who needs to store password hashes.

tags | paper
SHA-256 | 9b72c8fd503ebd25cdbebb177f28dba5b59183730431d92ae584879271c90add
HP Security Bulletin HPSBMU02786 SSRT100877
Posted Jun 28, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02786 SSRT100877 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, windows
advisories | CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379, CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317, CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885, CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053, CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823, CVE-2012-2012, CVE-2012-2013, CVE-2012-2014, CVE-2012-2015, CVE-2012-2016
SHA-256 | 856251204fbecc5944b74b48232e96b353c5844f102f2b4ea9de3e11e27b5a7d
Real Player 10 Gold Exception Handling
Posted Jun 28, 2012
Authored by Dark-Puzzle

This is a local exploit for Real Player 10 Gold that uses a division by zero to trigger an exception handler.

tags | exploit, denial of service, local
SHA-256 | bef48a2af7c152b4698cbb3e2c9b4d15795525b8bf8b700a9f8abe631953ac07
VLC 2.0.1 Denial Of Service
Posted Jun 28, 2012
Authored by Dark-Puzzle

VLC version 2.0.1 suffers from an avi playlist denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 6400dd1a7d12ff853c19c53043a4fdc93b5051de204e01bf898e62de9dd1b0da
Top Nepal SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

Top Nepal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3ba635007f36f932c35f438db58d698a1d107c3d5ab8dd5f34fde15067be1fb9
Rubysoft Solutions SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

Rubysoft Solutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ba290eedef8200b1eb3154a06936e7759014d52573641910f37674f180b975c1
Rhdesign SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

Rhdesign suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 994b3f6e5919e91c1ef54e6bb6a1a043d9a4a5d9b2f422fabca853fc9f8a7e19
Rainbowdigital SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

Rainbowdigital suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 99d02de14a1f053395b2d6291f379842ae9851cf7644f89cd9216c54bd15763f
Pixel Identity SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

Pixel Identity suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 53f5fcf3cc37318783474b06a01479a5a240e95c4363fa65ca213b751405f7d5
MUSOYAN SQL Injection
Posted Jun 28, 2012
Authored by Taurus Omar

MUSOYAN suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e648a2199ca11ed45130c62574b55d301604796519c02fe8df2432b5d4b892f5
Page 4 of 48
Back23456Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close