exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2011-08-17 to 2011-08-18

Zero Day Initiative Advisory 11-268
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-268 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way RealPlayer handles DEFINEFONT fields in Flash Files. When the process parses corrupt a ShapeRecord with the DefineFont record it reads outside a stack buffer and uses a random stack value as a heap pointer. Later this pointer will be used to write data into. The resulting corruption can lead to remote code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-2948
SHA-256 | 5e61aa1c0dd0d3322339a2871be565333c58e9361524ac932545f51995f4cb78
Red Hat Security Advisory 2011-1167-01
Posted Aug 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1167-01 - SeaMonkey is an open source web browser, email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. A flaw was found in the way SeaMonkey handled malformed JavaScript. A web page containing malicious JavaScript could cause SeaMonkey to access already freed memory, causing SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey.

tags | advisory, web, arbitrary, javascript
systems | linux, redhat
advisories | CVE-2011-2982, CVE-2011-2983
SHA-256 | 2870e5c70954b126aed022e80d7fb0433ac5d1859390db856c4a5ae980865df9
Red Hat Security Advisory 2011-1166-01
Posted Aug 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1166-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML content. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. A dangling pointer flaw was found in the Thunderbird Scalable Vector Graphics text manipulation routine. An HTML mail message containing a malicious SVG image could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2011-0084, CVE-2011-2378, CVE-2011-2982
SHA-256 | d07229aa2330f70302700aa4bfbf13bacc4cf2d26907cbd137d72e160c3cfdd4
Netplanet SQL Injection
Posted Aug 17, 2011
Authored by Ehsan_Hp200

Netplanet suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 791b56b0b9344149c4de14c3653b6caf155f5d9a65d1bdf92d13e26f4aaa4541
Zero Day Initiative Advisory 11-267
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-267 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way RealPlayer handles ID3v2 Tags. RealPlayer creates a fixed size buffer for certain tags and will then populate them with the data from the file. It uses a call to WideCharToMultiByte to convert the data, but fails to take into account that converting a single wide char might result in more then two multi-byte chars. This causes more data to be written into the fixed buffer then anticipated resulting in a heap buffer overflow.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2011-2949
SHA-256 | 5385faa2d7dde38ad73a22ef3b8f23f66bab1cde6cff8768488cb79618bfe0e3
Code Widgets Multiple Question - Multiple Choice Online Questionaire SQL Injection
Posted Aug 17, 2011
Authored by L0rd CrusAd3r

Code Widgets Multiple Question - Multiple Choice Online Questionaire suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0318bfb4cfdc80387f104ef561dd1133a04e04c172dd79b88ea01bd32af2dc34
Code Widgets DataBound Index Style Menu SQL Injection
Posted Aug 17, 2011
Authored by L0rd CrusAd3r

Code Widgets DataBound Index Style Menu suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a08157d34b3038a71365eed7e228fb47a5ff5d1f3c33eac71cbb3460fc03e2a5
Zero Day Initiative Advisory 11-266
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-266 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to the application using a size defined in a header in order to allocate some number of bytes. When processing an AAC raw_data_frame, the application will use the product of the original length and a field inside one of its elements. During the copy operation, this length will be larger than the amount that was allocated for which will cause a buffer overflow and can lead to code execution under the context of the application.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2011-2951
SHA-256 | a998f646bb1270ea83464962d917e05f0291127b3e16d665205fc3e7ef88b7e2
InYourLife SQL Injection
Posted Aug 17, 2011
Authored by Ehsan_Hp200

InYourLife suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 678103d7da66f300b30eaf0972d7bca88619a79fc3062cee580ea77ec976dc09
Red Hat Security Advisory 2011-1165-01
Posted Aug 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1165-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML content. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. A flaw was found in the way Thunderbird handled malformed JavaScript. Malicious content could cause Thunderbird to access already freed memory, causing Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, arbitrary, javascript
systems | linux, redhat
advisories | CVE-2011-2982, CVE-2011-2983
SHA-256 | 3cd6ca66f068b1b2fe5726f2d8a9a5ad9561c628bc1d7331dc50d6af1daab8d9
Zero Day Initiative Advisory 11-265
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-265 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within qcpfformat.dll, which is responsible for parsing QCP media files. The process creates a static 256 byte allocation on the heap and trusts a user-supplied counter from the file within a memory copy loop. As the source data is also user-supplied from the file, this can be abused by a remote attacker to execute arbitrary code running in the context of the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2011-2950
SHA-256 | b7524be329d663793a9abbc11c46bee42745e99635cdcb27b6bb37952693a381
Zero Day Initiative Advisory 11-264
Posted Aug 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-264 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Veritas Storage Foundation Administrator Service. Authentication is not required to exploit this vulnerability. The specific flaw exists within vxsvc.exe process. The problem affecting the part of the server running on tcp port 2148 is an integer overflow in the function vxveautil.kv_binary_unpack where a 32-bit field is used to allocate an amount of memory equal to its value plus 1. This can be made to miscalculate a heap buffer which can be subsequently overflowed allowing an attacker to execute arbitrary code under the context of SYSTEM.

tags | advisory, remote, overflow, arbitrary, tcp
advisories | CVE-2011-0547
SHA-256 | a9d18a1310ab066fd02701b485717fbb174c7976f45ca111320b8a6740eae98a
Muzedon SQL Injection
Posted Aug 17, 2011
Authored by Ehsan_Hp200

Muzedon suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 50f10f0b5ca487619beda5b2d0bbc96039a967c73c1f18f7e2db3977e34e1e32
Red Hat Security Advisory 2011-1164-01
Posted Aug 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1164-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A dangling pointer flaw was found in the Firefox Scalable Vector Graphics text manipulation routine. A web page containing a malicious SVG image could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2011-0084, CVE-2011-2378, CVE-2011-2981, CVE-2011-2982, CVE-2011-2983, CVE-2011-2984
SHA-256 | 773f2e4dd7737076c22577213e613c524818da6fe7791e5fcf2502dfd46dc22c
Code Widgets DataBound Collapsible Menu SQL Injection
Posted Aug 17, 2011
Authored by L0rd CrusAd3r

Code Widgets DataBound Collapsible Menu suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5f733832e96eb0428e0c1ca89cc0017367fa5def25aaf5806a606f70bca2914c
Code Widgets Online Job Application SQL Injection
Posted Aug 17, 2011
Authored by L0rd CrusAd3r

Code Widgets Online Job Application suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 1a5bb687b34722c0f36474acc005c68cda516a1781f31ef466a68fe736e2d76a
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close