exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files from Damian Saura

First Active2003-07-04
Last Active2010-12-01
Core Security Technologies Advisory 2010.1109
Posted Dec 1, 2010
Authored by Core Security Technologies, Damian Saura, Alejandro Frydman | Site coresecurity.com

Core Security Technologies Advisory - BugTracker.NET version 3.4.4 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2010-3266, CVE-2010-3267
SHA-256 | df62246969e76ce6e41b258ba8e60b03abae844da0cf2cafd62ae743eea6ad45
Core Security Technologies Advisory 2008.0320
Posted Apr 28, 2008
Authored by Core Security Technologies, Norberto Kueffner, Damian Saura, Anibal Sacco, Dario Menichelli, Andres Blanco, Rodrigo Carvalho | Site coresecurity.com

Core Security Technologies Advisory - Insufficient argument validation of hooked SSDT functions exists in BitDefender Antivirus 2008 Build 11.0.11, Comodo Firewall Pro 2.4.18.184, Sophos Antivirus 7.0.5, and Rising Antivirus 19.60.0.0 and 19.66.0.0. Older versions may be affected, but were not checked.

tags | advisory
advisories | CVE-2008-1735, CVE-2008-1736, CVE-2008-1737, CVE-2008-1738
SHA-256 | 0fa04aa1e85e203b50c317ecfa9b306142897af5e26a38640049097c9eab79fd
core.active.txt
Posted Jul 4, 2003
Authored by Eduardo Arias, Gabriel Becedillas, Ricardo Quesada, Damian Saura | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2003-0305-03 - The Microsoft Active Directory functionality is remotely and locally vulnerable to a stack overflow that allows an attacker to crash and force a reboot of any Windows 2000 server. Vulnerable package: Windows 2000 Server with Active Directory SP3. Fixed with Service Pack 4.

tags | exploit, overflow
systems | windows
SHA-256 | afedd8c7f809a694f9bb53497d9c62835d5aef2a503c9fd6108f9274b8cd15f5
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close