exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files Date: 2010-10-11

PHP-Fusion MG User-Fotoalbum SQL Injection
Posted Oct 11, 2010
Authored by Easy Laster

PHP-Fusion MG User-Fotoalbum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 967edeb547e4adc6c8736fb937e8dd20c1d1f59017d026dd6a61d5841e1d277c
Site2Nite Auto E-Manager SQL Injection
Posted Oct 11, 2010
Authored by KnocKout

Site2Nite Auto E-Manager suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fd77053130ebcf46a14b9ed9dfc25d65c1ca5219c8eefa149b3d33019c6e7df2
AoA Audio Extractor 2.x Active-X Exploit
Posted Oct 11, 2010
Authored by mr_me, Hadji Samir

AoA Audio Extractor version 2.x Active-X ROP exploit.

tags | exploit, activex
SHA-256 | 5af63c85bddc6ce41639e8ed709f6c7d3c778d5136fcdfbb0c6144a02d1eb814
Quicksite Pro SQL Injection
Posted Oct 11, 2010
Authored by KnocKout

Quicksite Pro suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 64b51fe94c8e0e045838224587d681618f41b6b127f5a7e00427a2278603f1e7
OrangeHRM 2.6.0.1 Local File Inclusion
Posted Oct 11, 2010
Authored by ZonTa

OrangeHRM version 2.6.0.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 89e2734057c9705d26fba3184dec76940fead3227e5d884c0d13f0e056351128
Mambo Trade Cross Site Scripting
Posted Oct 11, 2010
Authored by Fl0riX

The Mambo Trade component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0370f92339e7f0035ea960a10f3ea31bdaf946b59f943dfa626ded06928435a5
Netsniff-NG High Performance Sniffer 0.5.5.0
Posted Oct 11, 2010
Authored by Netsniff-NG Workgroup | Site netsniff-ng.org

netsniff-ng is is a free, performant Linux network sniffer for packet inspection. The gain of performance is reached by 'zero-copy' mechanisms, so that the kernel does not need to copy packets from kernelspace to userspace. For this purpose netsniff-ng is libpcap independent, but nevertheless supports the pcap file format for capturing, replaying and performing offline-analysis of pcap dumps. netsniff-ng can be used for protocol analysis, reverse engineering and network debugging.

Changes: Documentation updates, various code changes and improvements.
tags | tool, kernel, sniffer, protocol
systems | linux
SHA-256 | a6f3a47af80ff99d21b5e58cb41cc5ad322fe8bbf2e977c65a8c7abb9a32f37a
Secunia Security Advisory 41755
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Zope Object Database, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 16d8526e526f9b5bff0e2a24f55e524a7cfc33555843b58ca7d5da787161c5c6
Secunia Security Advisory 41769
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for openswan. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 62aa4f3e2b4af2701174c9ba56e2b9cdfcf4fc8f1c069fc1a452d07fc19c5d8a
Secunia Security Advisory 41768
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cgit. This fixes a vulnerability, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | e59ec92ad45382d8de7f35407280c61f2ca87c43e180e84959c034107c980d50
Secunia Security Advisory 41748
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Xsploited Security has discovered a vulnerability in SyncBreeze Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c0fefbbd84132facef3907373b3554393f0574e0afffe4f7491518241eacc06c
Secunia Security Advisory 41719
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in FTP Voyager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | d4556dd6ebd1bcd201478ac70afd6827a38851e18c65ca28a3fd03f07f22c2f5
Secunia Security Advisory 41763
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Truworth Flex Timesheet, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 507539bbd7e32bda1be91fbffcecf717ab554afdd64f2e3f08b2d0236560747d
Secunia Security Advisory 41756
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - l4yn3 has discovered some vulnerabilities in PHPYun, which can be exploited my malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | a8ed8010fca81d373f1732992652635da172fb7716b2561507c5e03b6030a5ae
Secunia Security Advisory 41739
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for subversion. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | 7239c31dda91921910d7b5eaf01887e5b6c42cb3761f409f020d89dab1939da5
Secunia Security Advisory 41766
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in JS Calender component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | d86990196a44e9cc4a08657b380135ee64642043c514e6a86361d13f22fc1517
Secunia Security Advisory 41749
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in BaconMap, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | 9ab35d44172c4d7da1a6eff797af9e302ef4ce4a55e6264521f321db6d205a73
Secunia Security Advisory 41750
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Site2Nite Auto e-Manager, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 05a61095c4c07f9667fe420d77d3b5e4716cfde656af82a4c7924492499d6007
Secunia Security Advisory 41773
Posted Oct 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in SyncBreeze Server, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | aaf23b656b4c02c4049470256622102aa8d57a4a6b48f9e5ad3c5de96a381979
Firewall Builder With GUI 4.1.2
Posted Oct 11, 2010
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This release contains a number of bugfixes and usability enhancements. Usability enhancements are designed to make it easier for new users to learn how to use Firewall Builder. Updates include enabling tooltips by default, adding new tooltips, and providing other navigation aids. Several configuration wizards, like the New Firewall and New Host wizards, were simplified to make it easier to create new objects. Major bugfixes include fixing installer issues on Windows systems where users use Putty sessions and fixing wildcard interfaces in PREROUTING rules.
tags | tool, firewall
systems | cisco, linux, openbsd
SHA-256 | 3eae607b06bc47f85241d952c3c9bce422625aaff7ec1d632ca0fae1c977b15c
Firewall Log Watch 1.2
Posted Oct 11, 2010
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release features extended netfilter and Cisco PIX/ASA parsers and large amounts of fixes.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
SHA-256 | 37fdfb49085fc7871b2bda30c4f334732cc552c1451aede94d96976e9122a92c
Debian Linux Security Advisory 2115-2
Posted Oct 11, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2115-2 - Several remote vulnerabilities have been discovered in Moodle, a course management system. DSA-2115-1 introduced a regression because it lacked a dependency on the wwwconfig-common package, leading to installations problems. This update addresses this issue.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2010-1613, CVE-2010-1614, CVE-2010-1615, CVE-2010-1616, CVE-2010-1617, CVE-2010-1618, CVE-2010-1619, CVE-2010-2228, CVE-2010-2229, CVE-2010-2230, CVE-2010-2231
SHA-256 | 27c05e9480cf3f1ddebc7ae714593ecda2d62cc612f6ee8c4280ae73598bf21b
BaconMap 1.0 SQL Injection
Posted Oct 11, 2010
Authored by AutoSec Tools

BaconMap version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 027ab21305aed6ebd8826601bd015dfc6a4d95565da54f363bb37ea41d384e1f
BaconMap 1.0 Local File Inclusion
Posted Oct 11, 2010
Authored by AutoSec Tools

BaconMap version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b04e1f6e2fed624b7cdb49d5929580c4c6c4a99717bbbfa3bdbd8754f286f517
Sync Breeze Server 2.2.30 Buffer Overflow
Posted Oct 11, 2010
Authored by xsploited Security

Sync Breeze Server version 2.2.30 remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 2ea4239f4bc3ba3677f10749cd14e33e6c090fa74c5f4bbe8fc6a7a59f85284f
Page 1 of 3
Back123Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close