exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Corey LeBleu

First Active2007-11-27
Last Active2008-12-30
Digital Defense VRT Advisory 2008.16
Posted Dec 30, 2008
Authored by Digital Defense, Corey LeBleu, r@b13$ | Site digitaldefense.net

The Citrix Broadcast Server administrative login page is vulnerable to trivial SQL injections via the txtUID HTTP POST parameter. An attacker could leverage this flaw to obtain unauthorized access to the web interface or to extract data from the database via blind SQL injection.

tags | advisory, web, sql injection
SHA-256 | 3d5db43c4aa4093db243a62d6926f5bcb8ee486ff32706192155dc2b1ed03ea2
Digital Defense VRT Advisory 2008.15
Posted Nov 21, 2008
Authored by Digital Defense, Corey LeBleu, r@b13$ | Site digitaldefense.net

The iPhone Configuration Web Utility 1.0 for Windows web interface is vulnerable to a common web directory traversal attack. Successful exploitation will result in arbitrary read-onlyfile access outside of the iPhone Configuration Web Utility 1.0 web root.

tags | advisory, web, arbitrary, root
systems | windows, apple, iphone
SHA-256 | 7ce5fcd314e35e70c977c9545e1d933f9a4885f0dd88693baff62488638736c9
Digital Defense VRT Advisory 2008.13
Posted Sep 3, 2008
Authored by Digital Defense, Corey LeBleu, r@b13$ | Site digitaldefense.net

PageR versions below 5.0.l7 from AVTECH suffer from a directory traversal vulnerability.

tags | advisory
SHA-256 | fa3adea33552ca9262630da8516877402668262951127620425fcaead47745da
sentinel-traverse.txt
Posted Nov 27, 2007
Authored by Corey LeBleu | Site digitaldefense.net

A classic directory traversal condition exists within the Sentinel Protection Server. By sending in an HTTP GET request with a path of a file proceeded by and escaped traversal sequence, an attacker can leverage an arbitrary file access condition on the affected system. Sentinel Protection Server version 7.1 is affected.

tags | advisory, web, arbitrary, file inclusion
SHA-256 | dffb03dd9181a15df67067f309c62e9515445ba6b21dab2a0a783789bdd11745
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close