exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2012-03-04 to 2012-03-05

Debian Security Advisory 2425-1
Posted Mar 4, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2425-1 - It was discovered that PLIB, a library used by TORCS, contains a buffer overflow in error message processing, which could allow remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-4620
SHA-256 | a273caa05d5696af4e8dbdf3162c6298565d18d0a91b99376225d60baefb33d0
Debian Security Advisory 2424-1
Posted Mar 4, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2424-1 - It was discovered that the XML::Atom Perl module did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

tags | advisory, perl
systems | linux, debian
SHA-256 | 16adf478b84cf66a88d7f0a06c98559c46471ef95b20edd713c57890ea15f8b5
Simple Fuzzing Utility 0.7.0
Posted Mar 4, 2012
Authored by aaron conole | Site aconole.brad-x.com

Simple Fuzz is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.

Changes: Fixed a long standing bug in the memory block replacement code. Added the ability to fuzz via blocks (ala spike/sulley fuzz frameworks). Added the ability to trap crashes via a harness program.
tags | fuzzer
SHA-256 | a65bb4d048c713dd9ecc4b42b98cc124516fd5c1df19deddfc664476aad7caac
Lastguru ASP Guestbook SQL Injection
Posted Mar 4, 2012
Authored by demonalex

Lastguru ASP Guestbook suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | 7647a173e3a544c79753938e1534393439d68cd8fb354d9d974f67bded9d6f47
deV!L`z Clanportal Witze 0.9 SQL Injection
Posted Mar 4, 2012
Authored by Easy Laster

deV!L`z Clanportal Witze add-on version 0.9 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1a41b3da1ce02aa31f75b547c7ce2bfc84fead8cc9e1e96acd6aaf17fff8eb77
EditMe Cross Site Scripting
Posted Mar 4, 2012
Authored by Sony

EditMe suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 253d5d3a106b79ee4ef99528f28553507494cc97a791c7f9476b257ddf266db1
SOFTEKS Web SQL Injection
Posted Mar 4, 2012
Authored by Th4 MasK

SOFTEKS Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | bb2dbe63e0ced81c677ce28f93290c695000f1c83124843e630e34f4e05ec7b8
AneCMS 2e2c583 Local File Inclusion
Posted Mar 4, 2012
Authored by I2sec-PJH

AneCMS version 2e2c583 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 9e8d6f19ac3c731e550ba6cb8a3a077e6454c5086b382ad073456a0a1185216d
Interlogy Profile Manager Basic Insecure Cookie Handling
Posted Mar 4, 2012
Authored by zer03s

Interlogy Profile Manager Basic suffers from an insecure cooking handling vulnerability that can allow for authentication bypass.

tags | exploit
SHA-256 | 392c64e2ef3471ad8a285a480383b25fe5254d311f51a5836523f4311b8a07a0
Microsoft POSReady 2009 Eval CD Remnants
Posted Mar 4, 2012
Authored by Stefan Kanthak

The POSReady 2009 eval CD from Microsoft Download Center appears to show remnants of having been built on a system that may have been infested with malware.

tags | advisory
SHA-256 | 98574b9c4e7396b432dee4fec8355515fa5bbf580d0c13b2c6b422247bf2f5c7
IETF I-D On Fragmentation Related Security Issues Revision 01
Posted Mar 4, 2012
Authored by Fernando Gont

This Internet Draft specifies the security implications of predictable fragment identification values in IPv6. It primarily focuses on countermeasures and mitigations.

Changes: Various updates and additions.
tags | paper
SHA-256 | 797c390e09afddabe88fd2b44a2368bbbcd4539539cf70a92b9a03e8ffc6de92
Iberianestates.com Cross Site Scripting
Posted Mar 4, 2012
Authored by Th4 MasK

Iberianestates.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3fdaf87a1ed6dc9fda5ed4fd9564d632f7843b99ae5234d92d5665abcaa10a07
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close