exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2011-12-25

Debian Security Advisory 2371-1
Posted Dec 25, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2371-1 - Two buffer overflows were discovered in JasPer, a library for handling JPEG-2000 images, which could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-4516, CVE-2011-4517
SHA-256 | 378ae0ceefe4816301fc1cbd5602b9554680c22218691bc93c90385f418234a7
Hardware Involved Software Attacks
Posted Dec 25, 2011
Authored by Jeff Forristal

Whitepaper called Hardware Involved Software Attacks. Computer security vulnerabilities involving hardware are under-represented within the security industry. With a growing number of attackers, malware, and researchers moving beyond pure software attack scenarios and into scenarios incorporating a hardware element, it is important to start laying a foundation on how to understand, characterize, and defend against these types of hybrid attacks. This paper introduces and details a starting taxonomy of security attacks called hardware involved software attacks, in an effort to further security community awareness of hardware security and its role in upholding the security of the PC platform.

tags | paper, vulnerability
SHA-256 | c7725f5f5155ccae730b5464c6855db0d3283f354981f52fcebb60c92127731a
Windows Media Player 11.0.5721.5262 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 8f956aea0456c97de55561f1b85fde6e2d17e46339271b02a273569d29f09677
Putty 0.60 Denial Of Service
Posted Dec 25, 2011
Authored by Level

Putty version 0.60 null pointer denial of service exploit.

tags | exploit, denial of service
SHA-256 | c0e5d6fed8a39f92e5fe93389c056c8233af29be9277250b0220f8dccc1f7f2e
MySQL 5.5.8 Denial Of Service
Posted Dec 25, 2011
Authored by Level

MySQL version 5.5.8 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | e47dc3eb176f47a4d695cb60327c8ceca93506e42b7b61b174b504ddbbd485fd
FreeSSHd Remote Denial Of Service
Posted Dec 25, 2011
Authored by Level

FreeSSHD remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | 64ef29a432819a28b41d8f37b7d65cc811d1a982933c6caf1642e4ced0608e7a
Pre Studio Business Card Designer SQL Injection
Posted Dec 25, 2011
Authored by r45c4l

Pre Studio Business Card Designer suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c794f54bab399b0c0633492d18f99b818df6ffbe8246ade34257f886b2c02046
D-Zayn Web Design Access SQL Injection
Posted Dec 25, 2011
Authored by 3spi0n

D-Zayn Web Design Access suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | a1ae391f129cbd6c64b9a123df61a7dcf6e5f853e2420e8d50108ee26be570cb
Construindo Shellcodes
Posted Dec 25, 2011
Authored by m0nad

Whitepaper called Construindo Shellcodes. It discusses how to build shellcodes and use them. Written in Portuguese.

tags | paper, shellcode
SHA-256 | 8a69b4c29cd9e658b54a12c337266f622bc5a9644d51ae9a62cf454b59fa26b1
GraphicClone Cross Site Scripting
Posted Dec 25, 2011
Authored by Mr.PaPaRoSSe

GraphicClone suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7e386b1f62fdf95ab4f2156dbfe331cae9df9200886e6339cdf26aab4295c59f
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close