exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2011-12-25

Debian Security Advisory 2371-1
Posted Dec 25, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2371-1 - Two buffer overflows were discovered in JasPer, a library for handling JPEG-2000 images, which could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-4516, CVE-2011-4517
SHA-256 | 378ae0ceefe4816301fc1cbd5602b9554680c22218691bc93c90385f418234a7
Hardware Involved Software Attacks
Posted Dec 25, 2011
Authored by Jeff Forristal

Whitepaper called Hardware Involved Software Attacks. Computer security vulnerabilities involving hardware are under-represented within the security industry. With a growing number of attackers, malware, and researchers moving beyond pure software attack scenarios and into scenarios incorporating a hardware element, it is important to start laying a foundation on how to understand, characterize, and defend against these types of hybrid attacks. This paper introduces and details a starting taxonomy of security attacks called hardware involved software attacks, in an effort to further security community awareness of hardware security and its role in upholding the security of the PC platform.

tags | paper, vulnerability
SHA-256 | c7725f5f5155ccae730b5464c6855db0d3283f354981f52fcebb60c92127731a
Windows Media Player 11.0.5721.5262 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 8f956aea0456c97de55561f1b85fde6e2d17e46339271b02a273569d29f09677
Putty 0.60 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Putty version 0.60 null pointer denial of service exploit.

tags | exploit, denial of service
SHA-256 | c0e5d6fed8a39f92e5fe93389c056c8233af29be9277250b0220f8dccc1f7f2e
MySQL 5.5.8 Denial Of Service
Posted Dec 25, 2011
Authored by Level

MySQL version 5.5.8 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | e47dc3eb176f47a4d695cb60327c8ceca93506e42b7b61b174b504ddbbd485fd
FreeSSHd Remote Denial Of Service
Posted Dec 25, 2011
Authored by Level

FreeSSHD remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | 64ef29a432819a28b41d8f37b7d65cc811d1a982933c6caf1642e4ced0608e7a
Pre Studio Business Card Designer SQL Injection
Posted Dec 25, 2011
Authored by r45c4l

Pre Studio Business Card Designer suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c794f54bab399b0c0633492d18f99b818df6ffbe8246ade34257f886b2c02046
D-Zayn Web Design Access SQL Injection
Posted Dec 25, 2011
Authored by 3spi0n

D-Zayn Web Design Access suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | a1ae391f129cbd6c64b9a123df61a7dcf6e5f853e2420e8d50108ee26be570cb
Construindo Shellcodes
Posted Dec 25, 2011
Authored by m0nad

Whitepaper called Construindo Shellcodes. It discusses how to build shellcodes and use them. Written in Portuguese.

tags | paper, shellcode
SHA-256 | 8a69b4c29cd9e658b54a12c337266f622bc5a9644d51ae9a62cf454b59fa26b1
GraphicClone Cross Site Scripting
Posted Dec 25, 2011
Authored by Mr.PaPaRoSSe

GraphicClone suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7e386b1f62fdf95ab4f2156dbfe331cae9df9200886e6339cdf26aab4295c59f
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close