exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 71 RSS Feed

Files Date: 2010-08-12 to 2010-08-13

ToorCon 12 Call For Papers
Posted Aug 12, 2010
Site toorcon.org

ToorCon 12 Call For Papers - Papers and presentations are being accepted for ToorCon 12 to be held at the Convention Center in San Diego, CA from September 20th through the 22nd.

tags | paper, conference
SHA-256 | 8bb8d575fc2e6f3fa582330102bc64b1c67cec38e5d1e3cf92922e8673bbe063
Zero Day Initiative Advisory 10-148
Posted Aug 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-148 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the iccvid.dll module responsible for compression and decompression of VIDC (Cinepak) streams. The code within CVDecompress allocates a static amount of space for storing an RGB palette. By modifying a VIDC compressed stream within an AVI file, an attacker can force code within iccvid to loop excessively, each time incrementing the pointer for the palette storage. By abusing this behavior an attacker can execute arbitrary code under the context of the user invoking the application that uses this codec.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2010-2553
SHA-256 | 998a7f041ec87cfe1b92efe2118da7b75a92cc98423efdab771124829c1e5437
Zero Day Initiative Advisory 10-147
Posted Aug 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-147 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required in that a target must open a malicious media file or visit a malicious page. The specific flaw exists within the codec responsible for parsing layer 3 MPEG audio streams. By providing invalid values within the stream, heap memory can be easily corrupted. This could be leveraged by an attacker to execute remote code under the context of the user running the application.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2010-1882
SHA-256 | 5d14c840cb070900913e58fd61bed31763a4a4691444ae7a9f2da46599207697
Windows Movie Maker String Parsing Buffer Overflow
Posted Aug 12, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Windows Movie Maker, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by boundary errors when parsing strings in imported project files (.MSWMM) and can be exploited to cause a buffer overflow. Successful exploitation allows execution of arbitrary code. Windows Movie Maker version 2.1.4027.0 is affected.

tags | advisory, overflow, arbitrary
systems | windows
advisories | CVE-2010-2564
SHA-256 | 76eef5decde8a16a4b913aef17c165dae1584e546c0e39afd6c64ad00a613f0a
Zendesk Cross Site Request Forgery / Cross Site Scripting
Posted Aug 12, 2010
Authored by Luis Santana

Zendesk suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 024f7657b6aa9227056b577d9d8ed61ad1f01229594078618d836a6fc42b64a4
Microsoft Windows SfnLOGONNOTIFY Local Privilege Escalation
Posted Aug 12, 2010
Authored by MJ0011

Microsoft Windows SfnLOGONNOTIFY proof of concept privilege escalation exploit based on the vulnerability discussed in MS10-048.

tags | exploit, proof of concept
systems | windows
advisories | CVE-2010-1894
SHA-256 | 091c2b1f603ada446c0678d9b4df40e311ac6f36eea39da1e834d4e1eb26e299
Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption
Posted Aug 12, 2010
Authored by SkyLined

Msxml2.XMLHTTP.3.0 response handling memory corruption exploit that takes advantage of the vulnerability listed in MS10-051.

tags | exploit
advisories | CVE-2010-2561
SHA-256 | 36337c841a1ee6b14eb1a761db53bbab0d0efac57cda58f85dc96bb0cb3db271
Mandriva Linux Security Advisory 2010-147
Posted Aug 12, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-147 - layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2010-2755
SHA-256 | ae50c002632c61d71b9010c9358af64f2eefda72f86a2d7b26d7465eda3ae8c3
Sopcast 3.2.9 Buffer Overflow
Posted Aug 12, 2010
Authored by Sud0

Sopcast version 3.2.9 remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 8649b23b0560a33f56d05ad294b1860670869f80d563a28bc7b03394962a3a49
MS10-054 Proof Of Concept
Posted Aug 12, 2010
Authored by laurent gaffie

Exploit for the Microsoft SMB Server Trans2 zero size pool alloc vulnerability as discussed in MS10-054.

tags | exploit
SHA-256 | 939654afe2288d6e948a7df3cc4ffbd715224ce006d2df8c3546ea053a424566
Rosoft Media Player 4.4.4 Buffer Overflow
Posted Aug 12, 2010
Authored by Abhishek Lyall

Rosoft Media Player version 4.4.4 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | d788f5d5fbe39ff2df6d7ccdafa5b25a188ab8049559bf52ef00b80852b4e6a3
Mthree Development MP3 To Wav Decoder Denial Of Service
Posted Aug 12, 2010
Authored by Oh Yaw Theng

Mthree Development MP3 to WAV Decoder suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 748381e4a79ed364736fbd3dae897b831df2cdc9ca576d3365cbabc1f774527b
AoAAudioExtractor 2.0.0.0 Proof Of Concept
Posted Aug 12, 2010
Authored by Hadji Samir

AoAAudioExtractor version 2.0.0.0 active-x related proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | 8daaf5c4dba993bd17dedc22c446dfd590e706cfb5669c9b09dcf7949013f2c9
Linux Kernel 2.6.33.3 SCTP INIT Denial Of Service
Posted Aug 12, 2010
Authored by Jon Oberheide

Linux kernel versions 2.6.33.3 and below SCTP INIT remote denial of service exploit.

tags | exploit, remote, denial of service, kernel
systems | linux
advisories | CVE-2010-1173
SHA-256 | a35d8f03321604b0eee056d633f06be3f14c328a7fc6b0c000888fa3b75af760
Visual MP3 Splitter And Joiner 6.1 Denial Of Service
Posted Aug 12, 2010
Authored by Oh Yaw Theng

Visual MP3 Splitter and Jointer version 6.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 68d7e6217a463e10c3cec8ed1fe88e2956c110110bbb3a60126b1573db11ed46
Wizmall 6.4 Cross Site Request Forgery
Posted Aug 12, 2010
Authored by pyw1414

Wizmall version 6.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | dd648c0669b6c384e7dd8be3b555e949b7b4cc84c3b390d2c7aa0b323aca633d
Joomla Yellowpages SQL Injection
Posted Aug 12, 2010
Authored by _aL_Bayraqim_

The Joomla Yellowpages component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7c308a28236df976529dadc31475546accb996afac587e8f845a315726a2212f
Kleeja 1.0.0RC6 Database Disclosure
Posted Aug 12, 2010
Authored by indoushka

Kleeja version 1.0.0RC6 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c4f96d2e19766d8c44f0d29bd5916b69c0e33e42a8cc8b582b3eb4229b9ce82d
PHPKick 0.8 SQL Injection
Posted Aug 12, 2010
Authored by garwga

PHPKick version 0.8 statistics.php remote SQL injection exploit.

tags | exploit, remote, php, sql injection
SHA-256 | faf9a3b1fbd41a31ea0a001c8d00d5d0d7b59fe266c84bc96699a1f238f7b372
Fat Player 0.6b WAV File Processing Buffer Overflow
Posted Aug 12, 2010
Authored by Praveen Darshanam

Fat Player version 0.6b suffers from a .wav file processing buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 6e04e637bc747f7d62c6294e7c3171358d68272b5de32470b2a033f027362d70
Ubuntu Security Notice 965-1
Posted Aug 12, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 965-1 - Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomaki discovered that the slap_modrdn2mods function in modrdn.c in OpenLDAP does not check the return value from a call to the smr_normalize function. A remote attacker could use specially crafted modrdn requests to crash the slapd daemon or possibly execute arbitrary code. Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomaki discovered that OpenLDAP does not properly handle empty RDN strings. A remote attacker could use specially crafted modrdn requests to crash the slapd daemon. In the default installation under Ubuntu 8.04 LTS and later, attackers would be isolated by the OpenLDAP AppArmor profile for the slapd daemon.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-0211, CVE-2010-0212
SHA-256 | 3ca13ddfe2e88809d4d45a5479af662f44cb198db14ce2072fe0867f6ded3b2e
ffdshow Video CODEC Denial Of Service
Posted Aug 12, 2010
Authored by Nishant Das Patnaik

The ffdshow video codec suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | d562a525292f6aaf6c55683e5aa7bf43bb0e1651baf1de5844a2565190cfbfa5
myMP3-Player 3.0 Buffer Overflow
Posted Aug 12, 2010
Authored by Oh Yaw Theng

myMP3-Player version 3.0 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | bf73babdf5618d81d3f01d1199e4c8d9f52c6f9df7dfda9742438e8313cb8d7d
Advanced File Vault Active-X Heap Spray
Posted Aug 12, 2010
Authored by ThE g0bL!N

Advanced File Vault (eSellerateControl350.dll) active-x heap spray exploit.

tags | exploit, activex
SHA-256 | 47215ee07b3dbffea3094556c6dcc39e682effd7d68a29a4d4bb879f4069cb6b
Joomla Teams SQL Injection
Posted Aug 12, 2010
Authored by Salvatore Fresta

The Joomla Teams component version 1_1028_100809_1711 suffers from multiple remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 9b64e5f61e293b9177eddb45f62f1c3467e1f593e76977041397f83cac1d2c63
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close