exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 38 of 38 RSS Feed

Files Date: 2010-07-22 to 2010-07-23

Secunia Security Advisory 40630
Posted Jul 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenTTD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5f2e4d03ff0f13ec98a5ffb5faef7c548a669a544f8ff3ccdfd109fb062ceec7
Nmap Port Scanner 5.35DC1
Posted Jul 22, 2010
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: 17 new NSE scripts, major OS detection and version detection updates, big improvements to Ncat and Nping, and more.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 51a6cde0a6afee50799d59b1968f1a4011753bb535f070114fd60be62f59ad44
Zero Day Initiative Advisory 10-137
Posted Jul 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-137 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ov.dll module which is loaded by the webappmon.exe CGI program. This DLL defines a function execvp_nc which unsafely concatenates a controllable command string into a statically allocated stack buffer. By supplying overly large values to variables passed through an HTTP request a strcat_new can be made to overflow this buffer. An attacker can leverage this to execute arbitrary code under the context of the user running the webserver.

tags | advisory, remote, web, overflow, arbitrary, cgi
advisories | CVE-2010-2703
SHA-256 | 4357fb05cdbff5f38d74f3d1f6bd8c381ce35de1debafee648b5140a050a7975
Zero Day Initiative Advisory 10-136
Posted Jul 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-136 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Teaming. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Tomcat server installed by default with Teaming. The server exposes an AJAX request handler which allows a remote user to upload an image via the upload_image_file operation. By crafting a specially formatted filename an attacker can bypass a name-mangling mechanism and traverse outside the intended temporary directory. By uploading a malicious JSP document to the web directory, an attacker can abuse this functionality to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, web, arbitrary
SHA-256 | f994394bd7c0acacd47f2f89504badd2aa9972bb36f12c8e843a5952d0609c4d
Cisco Security Advisory 20100721-spcdn
Posted Jul 22, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Internet Streamer application, part of the Cisco Content Delivery System, contains a directory traversal vulnerability on its web server component that allows for arbitrary file access. By exploiting this vulnerability, an attacker may be able to read arbitrary files on the device, outside of the web server document directory, by using a specially crafted URL. An unauthenticated attacker may be able to exploit this issue to access sensitive information, including the password files and system logs, which could be leveraged to launch subsequent attacks. Cisco has released free software updates that address this vulnerability.

tags | advisory, web, arbitrary
systems | cisco
advisories | CVE-2010-1577
SHA-256 | 4b82964cc0211abf7e727598a155c0a975b720f1f1443b65fbc56dcf98a988eb
HP OpenView Network Node Manager ov.dll Buffer Overflow
Posted Jul 22, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in HP OpenView Network Node Manager (OV NNM). This vulnerability is caused by a buffer overflow error in the "ov.dll" library when processing certain arguments supplied via CGI executables, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary, cgi
advisories | CVE-2010-2704
SHA-256 | 9d75df44ff3c8c0d229daf1cf553a2a4cd7d753c691fd6883f4ec9efc5c9ad1f
HP OpenView Network Node Manager nnmrptconfig.exe Buffer Overflow
Posted Jul 22, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in HP OpenView Network Node Manager (OV NNM). This vulnerability is caused by a buffer overflow error in the "nnmrptconfig.exe" CGI when processing an overly long parameter value, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary, cgi
advisories | CVE-2010-2703
SHA-256 | 1117cd79239d8fd237e9ff9b178664136be4d9c9bfe965119bf853f606ba7bdc
coWiki 0.3.4 SQL Injection
Posted Jul 22, 2010
Authored by MustLive

coWiki versions 0.3.4 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c9d51e1abda92629bec518aa2b18143d37b63bea8e78f7e93fefc1aa3d61047c
Abzarak Cross Site Scripting
Posted Jul 22, 2010
Authored by Secanar

Abzarak suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5e9f49bf21e34f9a25a8f605c394fbff5a6bb658c36fe0720f312aaa455a782f
RSA Federated Identity Manager URL Redirection
Posted Jul 22, 2010
Site emc.com

RSA(r) Federated Identity Manager may be impacted by potential arbitrary URL redirection vulnerability that may be exploited by malicious people to bypass certain security restrictions. Versions 4.0 and 4.1 are affected.

tags | advisory, arbitrary
advisories | CVE-2010-2337
SHA-256 | a2bc9bfa4fd0542fa8bf08749c6d93fc8471404777491dfdf5d6baad0eb5fb6d
QQPlayer .cue Buffer Overflow
Posted Jul 22, 2010
Authored by Lufeng Li

QQPlayer local buffer overflow exploit that creates a malicious .cue file.

tags | exploit, overflow, local
SHA-256 | 512723806d8dbdc706a46b48006e6e94121cd44efad8af6286a9e9338fa9a470
ZipCentral Buffer Overflow
Posted Jul 22, 2010
Authored by Jiten Pathy

ZipCentral buffer overflow exploit that creates a malicious .zip file.

tags | exploit, overflow
SHA-256 | cc256ad7fc5e963cd311a27aa88579091f5dafa75c1aa53e6b2633fc9704e5b8
OpenX phpAdsNew Remote File Inclusion
Posted Jul 22, 2010
Authored by ViRuS Qalaa

OpenX phpAdsNew version 2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | d11f6ab7bd814ac98b45432fe698799cf7a00465becfa721ccc1ccf34a8f4da8
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close