exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 65 RSS Feed

Files Date: 2012-02-23 to 2012-02-24

Oracle Java True Type Font IDEF Opcode Parsing Remote Code Execution
Posted Feb 23, 2012
Authored by Peter Vreugdenhil | Site tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Java handles True Type Font files. When reading a font file, Java will use the MaxInstructionSize from the maxp table to create a heap memory location to store all the Instruction Definition found in the Font Program 'fpgm' table. However, when Java encounters an IDEF opcode (0x89) in the opcode stream it never checks the size of the MaxInstructionSize which can result in a heap buffer overflow. This can lead to remote code execution under the context of the current process.

tags | advisory, java, remote, overflow, arbitrary, code execution
SHA-256 | 7d7c2f550994a2e5cd5e28b925d468c48c1d40628d005eac85f1b8d0d1c73513
Return-Oriented Programming Na Unha!
Posted Feb 23, 2012
Authored by m0nad

Whitepaper called Return-Oriented Programming Na Unha! Written in Portuguese.

tags | paper
SHA-256 | e6b54ef5474c0dde40ebf73da35e14b105441360e400162136a7f59ae1fc1f07
D-Link DSL-2640B Authentication Bypass
Posted Feb 23, 2012
Authored by Ivano Binetti

The D-Link DSL-2640B ADSL router suffers from a simple authentication bypass vulnerability by spoofing the MAC address of a logged in administrator.

tags | exploit, spoof, bypass
SHA-256 | 12bc1d6056d32882aa0e9cb89830f0cca2bd54029fb7e936e8201175dcf085f6
AlegroCart 1.2.7 Command Execution
Posted Feb 23, 2012
Authored by T0xic

AlegroCart versions 1.2.7 and below suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 8906b8c516eca8beaffa239a56c986b687fe22e0bbea94995dd12db785b413fd
Snom IP Phone Privilege Escalation
Posted Feb 23, 2012
Authored by Nathaniel Carew | Site senseofsecurity.com.au

All versions of Snom IP Phone prior to 8.4.35 suffer from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 9e5b6063e0a97f160456f3011fab1f5a1ffe250662f024fd27b0438d6244a154
Zero Day Initiative Advisory 12-038
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-038 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within JavaFX, a downloadable Java extension. The JavaFX Jar file is signed by Oracle and can be installed without user interaction. Once installed it is possible to invoke the main method of any trusted class with arbitrary arguments and with a trusted call stack. This can be leveraged to remote code execution under the context of the user.

tags | advisory, java, remote, arbitrary, code execution
SHA-256 | e396c40d1238a4b32b4de88a4e7c7a94f996dbe67c411ef01c6eb21bc7741d5a
Zero Day Initiative Advisory 12-037
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-037 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java Webstart. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within javaws.exe . Java Web Start does not safely handle double quotes that are placed anywhere except the beginning of certain property names in JNLP files. As a result, double quotes can be used to inject arbitrary command-line arguments into a javaw.exe process. Leveraging this would allow a remote attacker to execute code under the context of the user.

tags | advisory, java, remote, web, arbitrary
SHA-256 | a095f2b41c9458ca35fc7a84f9fa435bcb5c3afdd726d804553da5e42524a72c
Joomla Dtregister SQL Injection
Posted Feb 23, 2012
Authored by the_cyber_nuxbie

The Joomla Dtregister component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 65e80b3f210c1e73e50e08d5e43c366ea8b27b94dd89264c86eafe5517fcfcec
Interspire Shopping Cart Insecure Permissions
Posted Feb 23, 2012
Authored by Jan van Niekerk

Interspire Shopping Cart forces poor permissions on config.php by design and by doing so leaks information like the database login and password to any local user.

tags | exploit, local, php
SHA-256 | 9d05628969bbd9b9924bbbd92def920b91d205c03bda6ef7a31e2cadde891336
Zero Day Initiative Advisory 12-036
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-036 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the handling of VML element positioning. When appending a VML element to a textArea element a reference to a cDispScroller object can be improperly freed. The object is can be reused, and due to this object being freed, a later allocation can be located in this memory region. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.

tags | advisory, remote, arbitrary
advisories | CVE-2012-0155
SHA-256 | 91ba23f83f6adbe244489b8b48522efdcef4f230714e8addb8a8a5a7d593320c
Sagem F@ST 2604 Cross Site Request Forgery
Posted Feb 23, 2012
Authored by KinG Of PiraTeS

Sagem F@ST 2604 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 74e794395ae33f36ccefae87e8b2d46683cef12874bda5794a7eecaa28e7b141
BRIM SQL Injection
Posted Feb 23, 2012
Authored by ifnull

BRIM versions prior to 2.0.0 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ddbf79217d0f6948bdd819e704d1c86657d27f6b2f125021938e1ea3c31e2159
Mandriva Linux Security Advisory 2012-023
Posted Feb 23, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-023 - It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially-crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. The updated packages have been patched to correct this issue.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2012-0841
SHA-256 | 11f7dad26c9da70df5a6e937277e758f721a83530bf66fef369c67b2ce222427
Linux/x86 BackShell-TCP bash[/dev/tcp],execve(/bin/sh) Shellcode
Posted Feb 23, 2012
Authored by KedAns-Dz

62 bytes small Linux/x86 BackShell-TCP bash[/dev/tcp],execve(/bin/sh) shellcode.

tags | x86, tcp, shellcode, bash
systems | linux
SHA-256 | c11501f06303b67afdaf120cb4cec86433c1a1f77db9fe89aaa1c8245ba1b310
Zero Day Initiative Advisory 12-035
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-035 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required in that a target must visit a malicious page or open a malicious file. The flaw exists within MSHTML, specifically the handling of an HTML time t:MEDIA element. A t:MEDIA element can be manipulated such that when the page is refreshed a reference to a freed CDispNode object remains allowing the repurpose of this region. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.

tags | advisory, remote, arbitrary
advisories | CVE-2012-0011
SHA-256 | df4f311fcd1579648e5945d76912d846d27da68fbe2df2c21540d95d6a0122e9
WordPress Magn WP Drag And Drop Shell Upload
Posted Feb 23, 2012
Authored by JingoBD

WordPress Magn WP Drag and Drop suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 9c3a1e2929d6dfefc684c3c179e12959a1855400cc57101a1fd752e127f2ad57
DFLabs PTK 1.0.5 Cross Site Request Forgery
Posted Feb 23, 2012
Authored by Ivano Binetti

DFLabs PTK versions 1.0.5 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | d0dd0d5291656beb902ee24cbf78e1bb2167be976fb908dc3778acf0386749d2
Philip Abbey Cross Site Scripting
Posted Feb 23, 2012
Authored by Am!r | Site irist.ir

Philip Abbey suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 83f43bd596126238799a23deb4ecfdc673a48d3b85d4e7a906776a1305cbd030
Limesurvey Blind SQL Injection
Posted Feb 23, 2012
Authored by TorTukiTu

Limesurvey version 1.91+ build 11804 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a05a205bc66f62b6b8a8af72b4b06574dbecf005baccaca06cda5243dad8d5a0
D-Link DCS Series Cross Site Request Forgery
Posted Feb 23, 2012
Authored by rigan

D-Link DCS Series cross site request forgery proof of concept exploit that changes the administrative password.

tags | exploit, proof of concept, csrf
SHA-256 | f87043c8b0337b923a27ab33b7cd3afaddb37c82e480326ebf22682dff298efa
Zero Day Initiative Advisory 12-034
Posted Feb 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-034 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ASX meta files. When the code within wmp.dll attempts to process the version string within a meta file, it copies it to a fixed-length buffer on the stack without checking that the destination can contain the input data. This can be abused remotely by attackers to execute arbitrary code under the context of the user running the media application.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2012-0150
SHA-256 | a83c58db30683d599df4aeb59ef7425627e17a94a25da7f227d7ceab7170b361
Mandriva Linux Security Advisory 2012-022
Posted Feb 23, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-022 - Integer overflow in libpng allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2011-3026
SHA-256 | 7e81a111ef1b1fb00ad6d1aa3d0f796e2df59993d8ad6ea01b71c9d6e9575d7d
Tremulous Inherited Issues
Posted Feb 23, 2012
Authored by Simon McVittie

Tremulous, a team based FPS game with RTS elements, suffers from a large amount of old Quake related vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2006-2082, CVE-2006-2236, CVE-2006-2875, CVE-2006-3324, CVE-2006-3325, CVE-2011-2674, CVE-2011-3012
SHA-256 | 957204bc8a1064b5afc2c54e973081970d37c715e0429db6d279810022212fd1
OneForum SQL Injection
Posted Feb 23, 2012
Authored by Red Security TEAM

OneForum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c6c445fe0a680567ff0ec06f04169fe5710b4d5f846ec9cdde9c5de9f46eea71
WebcamXP / Webcam7 Directory Traversal
Posted Feb 23, 2012
Authored by Silent Dream

WebcamXP and Webcam7 suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d8deb6afe4f219e4e760d3a7e556e9078532191fa12d6a586fda9d318e44c4fa
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close