exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 31 of 31 RSS Feed

Files Date: 2010-04-22 to 2010-04-23

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion
Posted Apr 22, 2010
Authored by ItSecTeam

LightNEasy version 3.1.x suffers from file disclosure, local file inclusion, software installation and file upload vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure, file upload
SHA-256 | b46d9ffa03938924070a5a689b35a41395ca675c37d1491c970fa53b1caf2e5b
Zero Day Initiative Advisory 10-077
Posted Apr 22, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-077 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Download Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the gp.ocx ActiveX control. This control has a CLSID of {E2883E8F-472F-4fb0-9522-AC9BF37916A7} and the ProgID Atlcom.get_atlcom. Upon initialization this control copies the values from two parameters into a fixed length buffer. If supplied with large enough values this can lead lead to a buffer overflow that can be leveraged to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, overflow, arbitrary, activex
advisories | CVE-2010-1278
SHA-256 | 128165a7d8d8eef28948328c1084fc940def985af623cd253fd21e35d7905329
Joomla Portfolio Local File Inclusion
Posted Apr 22, 2010
Authored by Mr.tro0oqy

The Joomla Portfolio component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | eb8d3627bbad8db35d7eb0679f9c0905787b1e9d6b8e376214a7fe5acff0e054
Cisco Security Advisory 20100421-vsc
Posted Apr 22, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Small Business Video Surveillance Cameras and Cisco RVS4000 4-port Gigabit Security Routers contain a vulnerability that could allow an authenticated user to view passwords for other users, regardless of the authenticated user's level of authorization. An unprivileged user could take advantage of this vulnerability to gain full administrative access on the device or view another user's credentials.

tags | advisory
systems | cisco
advisories | CVE-2010-0593
SHA-256 | 2891fd746e404214f8f7ec8bdef0e17c186d1686f316c0e22b4cac7e4176506f
imlib2 "IMAGE_DIMENSIONS_OK()" Logic Error
Posted Apr 22, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in imlib2, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused by a logic error within the "IMAGE_DIMENSIONS_OK()" macro in src/lib/image.h. This can be exploited to cause heap-based buffer overflows via e.g. specially crafted ARGB, XPM, and BMP image files.

tags | advisory, overflow
advisories | CVE-2010-0991
SHA-256 | 468d8120f75f67faa1343a7d1231b3d69caa8405116258fcbd1b58c624cfdefd
Core Security Technologies Advisory 2010.0406
Posted Apr 22, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A Cross Site Scripting (XSS) vulnerability has been discovered in CactuShop.

tags | exploit, xss
advisories | CVE-2010-1486
SHA-256 | 27b87383b836a5d421fa2c92b53e6cadc8c16ca54e451af91f467dfb9ae90f63
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close