exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-05-12

NuFW Authenticating Firewall 2.4.1
Posted May 12, 2010
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: This new release fixes some bugs in the client library and brings improvements relative to TLS support.
tags | tool, remote, firewall
systems | unix
SHA-256 | d7921610a1c045c8557dd0c719ad17b1d94b9c5e227409d9e07e53621c7025d8
Adobe Shockwave Player Font Processing Buffer Overflow
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by a boundary error when parsing embedded fonts. This can be exploited to cause a heap-based buffer overflow via a specially crafted Shockwave file. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-0987
SHA-256 | c0df90ba22d702d5895e0e567d8b513727f5c0fb8f18fea09ecb1d9b6df3de7b
Adobe Shockwave Player Asset Entry Parsing Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an error when processing asset entries and can be exploited to corrupt memory via a specially crafted Shockwave file. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0986
SHA-256 | fd7ee053649f29172199e1a95030011594179adc1655c800f9830c93e76ae257
Adobe Shockwave Player Integer Overflow Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an integer overflow error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-0130
SHA-256 | b5ce1892a860a21e337e443c62011c129dda014f2c804f59309422383732a762
Adobe Shockwave Player Array Indexing Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an array indexing error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0129
SHA-256 | aaccf5333966fa257d1abf65746a2b24762c1eea4ffaf39c72989322d81409fd
Adobe Shockwave Player Signedness Error Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a signedness error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0128
SHA-256 | 0de19e3ef14663cc00a96c258b363f1f0f8271752f2f8f61678d437370f2d5b8
Adobe Shockwave Player 3D Parsing Memory Corruption
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when processing FFFFFF45h Shockwave 3D blocks. This can be exploited to corrupt memory via a specially crafted Shockwave file. Successful exploitation allows execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0127
SHA-256 | 15a8dfe7974507aed2ca880478d7e11000be879f68bd99e4424659fe3687ca8a
Samba Denial Of Service
Posted May 12, 2010
Authored by laurent gaffie | Site stratsec.net

Two vulnerabilities were discovered within in the Samba Smbd daemon which allow an attacker to trigger a null pointer dereference or an uninitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues will result in a denial of service. Versions 3.4.7 and below and 3.5.1 and below are affected.

tags | exploit, denial of service, vulnerability
SHA-256 | 966a849f6f0bbe77647f785e18d732c6cf90fc1d9ef2d25203e0af89f41f2e05
Joomla Custom PHP Pages Local File Inclusion
Posted May 12, 2010
Authored by Chip D3 Bi0s

The Joomla Custom PHP Pages component suffers from a local file inclusion vulnerability.

tags | exploit, local, php, file inclusion
SHA-256 | 37fd7f99dcb7450f65f3206615ec7dc1c407e8e4212cb9622005d447b02cd167
iDEFENSE Security Advisory 2010-05-11.1
Posted May 12, 2010
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 05.11.10 - Remote exploitation of a heap memory indexing vulnerability in Adobe Systems Inc.'s Shockwave Player could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability takes place during the processing of a certain malformed file. A function calculates an offset to be used within a memory mapped file and returns the offset value. The return value is not checked. This can lead to a condition where an attacker is able to overwrite memory outside the bounds of the allocated memory map. iDefense has confirmed the existence of this vulnerability in the latest version of Shockwave Player at the time of testing, version 11.5.6r606. Shockwave Player 11.5.6.606 and earlier versions for Windows and Macintosh are vulnerable.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2010-0129
SHA-256 | d94b185f92bdc137032a8bcdd7bb769637e8dacb78286c282baa5d43828cc72b
Events Manager Wordpress Plugin 2.1 Blind SQL Injection
Posted May 12, 2010
Authored by Danilo Massa

Events Manager Wordpress plugin versions 2.1 and below suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 49ee90956f2a053ee664c6466f6d91586a585c8f4d3d2848c19b3094882dd546
Cumulus Widget For BlogEngine.NET Cross Site Scripting
Posted May 12, 2010
Authored by MustLive

The Cumulus widget for BlogEngine.net suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f9f2fb842980a1cbf6534317e4ac7e6639652b99bf6fdca510dfa960ec0a923f
Debian Linux Security Advisory 2045-1
Posted May 12, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2045-1 - Bob Clary, Dan Kaminsky and David Keeler discovered that in libtheora, a video library part of the Ogg project, several flaws allow allow context-dependent attackers via a large and specially crafted media file, to cause a denial of service (crash of the player using this library), and possibly arbitrary code execution.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-3389
SHA-256 | fa35d975d28eaad266cdb2a8f03dc6bb1b4d40ed95aa95d20e92299281e0d163
Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used during a memory dereference a possible 4-byte memory overwrite may occur. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

tags | advisory, remote, web
advisories | CVE-2010-1280
SHA-256 | a0f77eecd2a1403c980cb9c466c4691d6c105d645ef19b2d595726c654d1d978
Adobe Shockwave Player Director File Parsing Integer Overflow
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used extern to signed integer. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

tags | advisory, remote, web
advisories | CVE-2010-0129
SHA-256 | cf8e78b21a4eb4ac23bd52a6d488b0cc6e64d0a9c2ab1359260c09254c4e44f0
Adobe Shockwave Player Director File Parsing ATOM Size Infinite Loop
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. Exploitation can lead to remote system high cpu load (infinite loop).

tags | advisory, remote, web
advisories | CVE-2010-1282
SHA-256 | 0a144e4f9c1a09ee66a7a07dc51e8d46f392d77a7ee37b73e6d6eb2a5343baff
Zervit 0.4 Directory Traversal
Posted May 12, 2010
Authored by AutoSec Tools

Zervit version 0.4 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 7c1ca6fe84c4de2aa716b107c41d848c7e69aa998fa8938b2484e801aeeb0a1c
Ghostscript Stack Overflow
Posted May 12, 2010
Authored by Dan Rosenberg

Ghostscript suffers from code execution and stack overflow vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
advisories | CVE-2010-1869
SHA-256 | 3ae78b80a2f029d3507689c46f8386059dca772b84fc5bee89098e5fb38a420b
Adobe Shockwave Player 11.5.6.606 Memory Corruption
Posted May 12, 2010
Authored by LiquidWorm

Shockwave Player versions 11.5.6.606 and below from Adobe suffer from memory consumption / corruption and buffer overflow vulnerabilities that can aid the attacker in causing a denial of service scenario and arbitrary code execution. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, code execution
advisories | CVE-2010-1280
SHA-256 | 8ec4df5f63f6cfd2422941ca53290e7e3b28c5e09824a064172cf191aa1bea88
Zero Day Initiative Advisory 10-089
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-089 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director files. When the application parses the pami RIFF chunk, it trusts an offset value and seeks into the file data. If provided with signed values in the data at the given offset, the process can be made to incorrectly calculate a pointer and operate on the data at it's location. This can be abused by an attacker to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1292
SHA-256 | b0f3e98e0013cb6764a4bb4e0ad867ded078f4a857a2b0f9b74785a7f0adfd8f
Zero Day Initiative Advisory 10-088
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-088 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the code responsible for parsing 3D objects defined inside Director files. An undocumented 4-byte field within record type 0xFFFFFF49 can be modified to cause corruption of heap memory. This corruption can be used to modify function pointers and achieve code execution.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-1283
SHA-256 | 5e8e6aca52cd9ed7563236913285f6f64f77388220a08ca6e191ad9106f6dc26
Apple Safari 4.0.5 parent.close() Code Execution
Posted May 12, 2010
Authored by Krystian Kloskowski

Apple Safari version 4.0.5 parent.close() memory corruption code execution exploit.

tags | exploit, code execution
systems | apple
SHA-256 | ec04bbdd890c422fd0bf99cfa6580ba3c2940087c9f7ba1dbbb3e82ee2f42968
724CMS Enterprise 4.59 Local File Inclusion
Posted May 12, 2010
Authored by CoBRa_21

724CMS Enterprise version 4.59 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 0eae52b395b389ce17db83940bc719f6ccd308c8deb409c11ac294a7001ba1b5
Zero Day Initiative Advisory 10-087
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-087 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required in that a target visit a malicious website. The specific flaw exists within the code responsible for parsing Director files. The vulnerable function is exported as an ordinal from the iml32.dll module. Ordinal 1409 trusts a value from the file as an offset and updates pointers accordingly. By crafting a large enough value and seeking the file pointer past the end of a buffer this can be abused to corrupt heap memory. An attacker can abuse this to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1281
SHA-256 | 548c4ae30db5628a899d255cd9bcf59d4725bf60d8ac176ba248fdd5c8a1f82a
ekoparty Security Conference And Training 6th Edition
Posted May 12, 2010
Site ekoparty.com.ar

Call For Papers for the 6th edition of the Ekoparty Security Conference being held from September 13th through the 15th, 2010, in Buenos Aires City, Argentina.

tags | paper, conference
SHA-256 | cfab5c9373d59f0a2818f8c55a1bc0a38dd1ac71c43c8c756251bfd0a79d669c
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close