what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 42 RSS Feed

Files Date: 2006-11-17

aspmforum.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Aspmforum suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 1e6b43ce05ce008b450cfa65c8cfbc9c83e51e3c11c767ceaeb0c83d3ae2c4de
baalasp.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

BaalAsp Forum suffers from SQL injection, login bypass, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 643171cde15161f560b98739f3cf88022ea92080f7a179314135ccd1e83fdd6c
anm-sql.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Active News Managers suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 58bca4b663545d3a9ca8aa7690152f0b3acdb73b0136719f2e8557fe27576307
ASPCart.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

ASP Cart suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection, asp
SHA-256 | 84d23364f664d5fab358443928e66069857c02918174868fb55917e9c00ca320
candypress.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

CandyPress Store suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 3873c14784b5ff01a66ff1c793f3d10eea9977802e602cf1e4d5530136fb11a0
pilotcart.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Pilot Cart version 7.2 suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | e0bd7805dcd9c2f0254714157a4a4f6271a6a84e2fc2b5bd634781b53ba3e1be
metacarteshop.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

MetaCart e-Shop suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 2676b1eb7e490bd6a470544533d7925b3ae789930e75b2aecf7503ce66034bcc
ecomkit1.txt
Posted Nov 17, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

E-commerce Kit 1 PayPal Edition suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 2f0353c9d309e573c12554f79f9421e017192995d80f3f1b4e48b4f0dbde212c
snort-2.6.1.tar.gz
Posted Nov 17, 2006
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: New pattern matcher with a significantly reduced memory footprint. Introduction of stream5 for experimental use. Improvements to stream4, including UDP session tracking and optimizations for the reassembly buffer. Handling for reassembly of SMB fragmented data in DCE/RPC. An ssh preprocessor for experimental use. Updated Snort decoder that can decode GRE encapsulated packets. Output plugin to allow Snort to configure Aruba access control. Bug fixes and performance improvements.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | d99fd31236c5036109779afce9f73710297fce17775b61cfa2c79ed10a70a7d8
pbnj-2.04.tar.gz
Posted Nov 17, 2006
Authored by Joshua D. Abraham | Site pbnj.sf.net

PBNJ is a suite of tools to monitor changes on a network over time. It does this by checking for changes on the target machine(s), which includes the details about the services running on them as well as the service state. PBNJ parses the data from a scan and stores it in a database. PBNJ uses Nmap to perform scans.

Changes: Small fixes, updates to man pages, and some enhancements.
tags | tool, scanner
systems | unix
SHA-256 | 3df88ea306bd47401766d69f32e5cd1fdc1f015e6a06c66a7fa7aba7dfd0f3b9
Secunia Security Advisory 22940
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Sybase Unwired Accelerator, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 2c60767da67a908da337f9ff20d9374e9b76a858fc90fa8372a313c7fd5d7992
Secunia Security Advisory 22925
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EC-CUBE, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 23d0b1caebdabe521efffe62ed9d50e34b763dd63eced980a5112689554a951c
Secunia Security Advisory 22934
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Afaria, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | f7336fab434accde6c82a3280d401e3bbba50d3552c0000dbd7055e9632ad550
Secunia Security Advisory 22935
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Sybase EAServer, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | f2284ed014e92b060bb4a3629d00aa15e00d61ddb7171e4fb16883b9e62673a1
Secunia Security Advisory 22936
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Mach Desktop, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | f7c1aef54f61ccca9ad2f686213cfb1d177da9e8fd7f680ebae1abf8e594b57a
Secunia Security Advisory 22937
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in mFolio, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 990acf388c3d8b0d21ebed92287f194720a25bcb2d84e1ad8cfd0c6ba2ed21b3
Secunia Security Advisory 22938
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in PowerBuilder, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e0e1ce9195be5a22caa1116c2f2f9ce45f35f11987b479b24d9bf021bb397d56
Secunia Security Advisory 22939
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Sybase RFID Enterprise, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 184b1ab07192653ba918173841989272105ff0dc91a64fb9be54e1a09e0774f5
Secunia Security Advisory 22943
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Laurent Gaffi

tags | advisory, vulnerability, sql injection
SHA-256 | 83d17bbad317970501286b62ec7bdbfa9d41d90e4dbf8f016d7172bae78a1897
Secunia Security Advisory 22944
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GLEG has reported a vulnerability in Helix DNA Server, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b1dc01ef86dade4fdd96b04f8217e99a42a78c6c48598ed4bc9d11a1ee756a3c
Secunia Security Advisory 22945
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious, local users to bypass certain security restrictions, expose potentially sensitive information, or to cause a DoS (Denial of Service), and by malicious people to cause a DoS.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 46cd49dad771c7536dc74e0ce029f8f154210b43f30f981ebf4bdfa29a40f86b
Secunia Security Advisory 22946
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Laurent Gaffi

tags | advisory, vulnerability, sql injection
SHA-256 | 6a8cfad173136350fd2c2adc7763fb99a2a3d68d16fff599b0d58a23c4f0fb38
Secunia Security Advisory 22947
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AG-Spider has reported some vulnerabilities in Comdev One Admin Pro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | c8c4096c0167f4b94446d50698c5ac7fe41ea80938921303ed72d2789a599ab0
Secunia Security Advisory 22949
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sybase has acknowledged a vulnerability in Sybase Enterprise Portal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 7348fe7320e227bea983a11e1d454dd018c4adf281b537565f48c43ca17431af
Secunia Security Advisory 22952
Posted Nov 17, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aria-Security Team have reported some vulnerabilities in i-Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d88edc98049e8ea383ef0b0b4dbffbb2a2fce6c259057b784ac9b0d9198dde14
Page 1 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close