«
Expand/Collapse
39 items tagged "load"
Related tags:
mixer [+],
linux kernel [+],
linux [+],
kernel [+],
based buffer overflow [+],
zen [+],
string function [+],
simplexml [+],
phpmyadmin [+],
load balancer [+],
information disclosure vulnerability [+],
command execution [+],
webkit [+],
the [+],
sony pc [+],
sony [+],
service vulnerability [+],
root user [+],
resource load [+],
resource [+],
pc companion [+],
oracle [+],
mysql load data [+],
mysql [+],
load data infile [+],
libmodplug [+],
information disclosure [+],
file [+],
cpp [+],
buffer overflow vulnerability [+],
buffer [+],
abc [+],
outfile [+],
hacks [+],
dummy load [+],
balancer [+],
web application security [+],
vulnerability [+],
tool [+],
tar gz [+],
tar [+],
sqli [+],
security vulnerabilities [+],
rapid [+],
php [+],
nerd [+],
mental exercise [+],
load balancers [+],
little bit [+],
halberd [+],
gray code [+],
google [+],
george graves [+],
george [+],
exploits [+],
eevblog [+],
dynpage [+],
dummy [+],
disclosure [+],
design [+],
code [+],
classic [+],
cifs [+],
audio [+]
-
-
7:33
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:33
»
Packet Storm Security Recent Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:33
»
Packet Storm Security Misc. Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
-
11:07
»
Hack a Day
We’re not really interested in building a dummy load like this one for ourselves. But the concepts behind its design make for a nice little mental exercise as you read your way through the build description. [Pabr] wanted to build a dummy load which could be used to test a cheaply made gas generator. He [...]
-
-
23:44
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in ZEN Load Balancer version 2.0 and 3.0-rc1 which could be abused to allow authenticated users to execute arbitrary code under the context of the 'root' user. The 'content2-2.cgi' file uses user controlled data from the 'filelog' parameter within backticks.
-
23:44
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in ZEN Load Balancer version 2.0 and 3.0-rc1 which could be abused to allow authenticated users to execute arbitrary code under the context of the 'root' user. The 'content2-2.cgi' file uses user controlled data from the 'filelog' parameter within backticks.
-
23:44
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in ZEN Load Balancer version 2.0 and 3.0-rc1 which could be abused to allow authenticated users to execute arbitrary code under the context of the 'root' user. The 'content2-2.cgi' file uses user controlled data from the 'filelog' parameter within backticks.
-
-
16:01
»
Hack a Day
Inspired by a design he saw on the EEVblog, [George Graves] put together this constant current dummy load. You might need on of these if you’re testing power supplies or batteries. They pull a constant current regardless of the voltage of the supply. [George's] version extends the range of the original a little bit by [...]
-
-
19:01
»
Packet Storm Security Tools
Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.