exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2012-03-04

Debian Security Advisory 2425-1
Posted Mar 4, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2425-1 - It was discovered that PLIB, a library used by TORCS, contains a buffer overflow in error message processing, which could allow remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-4620
SHA-256 | a273caa05d5696af4e8dbdf3162c6298565d18d0a91b99376225d60baefb33d0
Debian Security Advisory 2424-1
Posted Mar 4, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2424-1 - It was discovered that the XML::Atom Perl module did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

tags | advisory, perl
systems | linux, debian
SHA-256 | 16adf478b84cf66a88d7f0a06c98559c46471ef95b20edd713c57890ea15f8b5
Simple Fuzzing Utility 0.7.0
Posted Mar 4, 2012
Authored by aaron conole | Site aconole.brad-x.com

Simple Fuzz is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.

Changes: Fixed a long standing bug in the memory block replacement code. Added the ability to fuzz via blocks (ala spike/sulley fuzz frameworks). Added the ability to trap crashes via a harness program.
tags | fuzzer
SHA-256 | a65bb4d048c713dd9ecc4b42b98cc124516fd5c1df19deddfc664476aad7caac
Lastguru ASP Guestbook SQL Injection
Posted Mar 4, 2012
Authored by demonalex

Lastguru ASP Guestbook suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | 7647a173e3a544c79753938e1534393439d68cd8fb354d9d974f67bded9d6f47
deV!L`z Clanportal Witze 0.9 SQL Injection
Posted Mar 4, 2012
Authored by Easy Laster

deV!L`z Clanportal Witze add-on version 0.9 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1a41b3da1ce02aa31f75b547c7ce2bfc84fead8cc9e1e96acd6aaf17fff8eb77
EditMe Cross Site Scripting
Posted Mar 4, 2012
Authored by Sony

EditMe suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 253d5d3a106b79ee4ef99528f28553507494cc97a791c7f9476b257ddf266db1
SOFTEKS Web SQL Injection
Posted Mar 4, 2012
Authored by Th4 MasK

SOFTEKS Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | bb2dbe63e0ced81c677ce28f93290c695000f1c83124843e630e34f4e05ec7b8
AneCMS 2e2c583 Local File Inclusion
Posted Mar 4, 2012
Authored by I2sec-PJH

AneCMS version 2e2c583 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 9e8d6f19ac3c731e550ba6cb8a3a077e6454c5086b382ad073456a0a1185216d
Interlogy Profile Manager Basic Insecure Cookie Handling
Posted Mar 4, 2012
Authored by zer03s

Interlogy Profile Manager Basic suffers from an insecure cooking handling vulnerability that can allow for authentication bypass.

tags | exploit
SHA-256 | 392c64e2ef3471ad8a285a480383b25fe5254d311f51a5836523f4311b8a07a0
Microsoft POSReady 2009 Eval CD Remnants
Posted Mar 4, 2012
Authored by Stefan Kanthak

The POSReady 2009 eval CD from Microsoft Download Center appears to show remnants of having been built on a system that may have been infested with malware.

tags | advisory
SHA-256 | 98574b9c4e7396b432dee4fec8355515fa5bbf580d0c13b2c6b422247bf2f5c7
IETF I-D On Fragmentation Related Security Issues Revision 01
Posted Mar 4, 2012
Authored by Fernando Gont

This Internet Draft specifies the security implications of predictable fragment identification values in IPv6. It primarily focuses on countermeasures and mitigations.

Changes: Various updates and additions.
tags | paper
SHA-256 | 797c390e09afddabe88fd2b44a2368bbbcd4539539cf70a92b9a03e8ffc6de92
Iberianestates.com Cross Site Scripting
Posted Mar 4, 2012
Authored by Th4 MasK

Iberianestates.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3fdaf87a1ed6dc9fda5ed4fd9564d632f7843b99ae5234d92d5665abcaa10a07
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close