exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2010-12-09

Aanval Intrusion Detection Tool 6
Posted Dec 9, 2010
Site aanval.com

Aanval is the industry's most comprehensive snort and syslog intrusion detection, correlation and management console. Aanval is designed specifically to scale from small single sensor installations to global enterprise deployments. Aanval is browser based and designed to work on all current variants of UNIX, Linux and Mac OS X.

Changes: New IP GeoLocation integration for plotting source and destination network addresses on Google Maps in real time. All new event correlation engine and interface as well as bug fixes throughout and performance enhancements all around. Additionally, the iPhone and iPad (Aanval iPhone & iPad App) integration has been enhanced as well.
tags | tool, sniffer
systems | linux, unix, apple, osx
SHA-256 | 143d497e26929855e635af421e6c5826b7d0cec6adb0074f0e04125773d42945
SSLDiagnos 0.6.10a
Posted Dec 9, 2010
Authored by James Dickson | Site sourceforge.net

This application is used to get information about SSL usage (protocols and ciphers) at a server. It can also be used for testing and rating ciphers on SSL clients. The code is written for win32 but may easily be ported to Linux.

Changes: Added some pop3s-functionality and compiled with latest openssl-1.0.0c.
tags | encryption, protocol
systems | linux, windows
SHA-256 | 4ee1f84f4d21182952ecfed8687cef4a825f3b6bef20b8f84d2eb0fcbd3331f7
AJ Matrix DNA SQL Injection
Posted Dec 9, 2010
Authored by Br0ly

AJ Matrix DNA suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cbccc521126f01abc2749814b6e1886052c204b837206f02a9e24e5614108b48
Diferior 8.03 Cross Site Scripting
Posted Dec 9, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Diferior version 8.03 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 938f6323363bd7e1056c46ac7b218ec374037c3e7e09971c6ccb74c209f4d510
Joomla Jesectionfinder SQL Injection
Posted Dec 9, 2010
Authored by Fl0riX

The Joomla Jesectionfinder component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3254232bdd949616e8fda09575a9820543787a0c58c052185ad784c10e7ee41a
Drupal Embedded Media Field Code Execution / Shell Upload
Posted Dec 9, 2010
Authored by Justin C. Klein Keane

Drupal 6.19 with Embedded Media Field 6.x-1.25 and CCK 6.x-2.8 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e48961e06a533cdacb83ae8fbdad0975b4725257cfb9d09b3c3f24ddff09fb8a
Joomla JE Messenger 1.0 Shell Upload
Posted Dec 9, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

The Joomla JE Messenger 1.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 28c7bab00d1980b37b55d7b9fe1701a9551802253ace9c0a2091c87047e44404
Firefox 3.6.13 pseudo-URL SOP Check Bug
Posted Dec 9, 2010
Authored by Michal Zalewski

Firefox version 3.6.13 fixes an interesting bug in their same-origin policy logic for pseudo-URLs that do not have any inherent origin associated with them.

tags | advisory
SHA-256 | db05b815023c5d8efd32e05c077cb830085cc4463b38385fc38d090ecd936b12
Joomla JE Auto 1.0 SQL Injection
Posted Dec 9, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

The Joomla JE Auto component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4a0cba77ddc75c87f12e36ab14b20fa51e5f74d0174a413f91e304c81d0cc0ed
WWWThreads 5.0.8 Pro Cross Site Scripting
Posted Dec 9, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

WWWThreads version 5.0.8 Pro suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d8143b734f68815dcab56427cd37d444cd143ddfe33bd6a633236e38eb421541
Joomla Jeformcr SQL Injection
Posted Dec 9, 2010
Authored by Fl0riX

The Joomla Jeformcr component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d3981c1acf6af807cb71e5d8c49aef23134289b8bf18e04f2930a55e8e524cac
Drupal Embedded Media Field Cross Site Scripting
Posted Dec 9, 2010
Authored by Justin C. Klein Keane

Drupal 6.19 with Embedded Media Field 6.x-1.25 and CCK 6.x-2.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3e4fc930adc768a98c38cadb8899485067256c5adccd77f043a3393b44404281
net2ftp Stable 0.98 Remote / Local File Inclusion
Posted Dec 9, 2010
Authored by Marcin Ressel

net2ftp version Stable 0.98 suffers from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | b090055348374a5ab55d0c844227af2eb10073929561a312b0e8ecd2a0de6035
Automated Discovery Of Parameter Pollution Vulnerabilities In Web Applications
Posted Dec 9, 2010
Authored by Engin Kirda, Davide Balzarotti, Marco Balduzzi, Carmen Torrano Gimenez

Whitepaper called Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.

tags | paper, web, vulnerability
SHA-256 | 4ad4bf71e8701368f5545f452a8a206b3c3638d7c19ed9f643825d8b391b4a83
Create A New User With UID 0 ARM Shellcode
Posted Dec 9, 2010
Authored by Jonathan Salwan

Metasploit framework plugin that generates shellcode to create a new user with uid 0 for the ARM architecture.

tags | shellcode
SHA-256 | 9d8fcf7ca8c8fb2be14a67055397ccae9e20e5aebce90829954cd7e054d0e01d
CMScout 2.09 Cross Site Request Forgery
Posted Dec 9, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

CMScout 2.09 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | b3337c553315da945c0681dcf34a56faad08acc33b7977c8d63a41f3041c0288
Ubuntu Security Notice USN-1019-1
Posted Dec 9, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1019-1 - Security issues have been addressed in firefox. Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov discovered several memory issues in the browser engine. It was discovered that Firefox did not properly verify the about:blank location elements when it was opened via window.open(). It was discovered that Firefox did not properly handle <div> elements when processing a XUL tree. Marc Schoenefeld and Christoph Diehl discovered several problems when handling downloadable fonts. Various other issues have also been addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2010-3766, CVE-2010-3767, CVE-2010-3768, CVE-2010-3770, CVE-2010-3771, CVE-2010-3772, CVE-2010-3773, CVE-2010-3774, CVE-2010-3775, CVE-2010-3776, CVE-2010-3777, CVE-2010-3778
SHA-256 | 35df1a0f6787fd7fa6bd1331d584b990b23ffcba5fb5436d85314ac4139bd94c
CMS Person SQL Injection
Posted Dec 9, 2010
Authored by jos_ali_joe

CMS Person suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a93832f39cc7a972acea25c4f1ebe066fda22803865f110d5a33aadf510d1c42
PHP State SQL Injection
Posted Dec 9, 2010
Authored by jos_ali_joe

PHP State suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 2903fad30173e3345e29083d565dde2cdc2b0e33737580253ee2ff5559378d69
VMware Tools Update OS Command Injection
Posted Dec 9, 2010
Authored by N. Grisolia | Site bonsai-sec.com

VMware Tools update suffers from an operating system command injection vulnerability.

tags | exploit
advisories | CVE-2010-4297
SHA-256 | e162bddb196fd315dee69e241052a3c0cab64061bc4e57a378057f5dc45e429a
Abtp Portal Project 1.0 Local File Inclusion
Posted Dec 9, 2010
Authored by Br0ly

Abtp Portal Project versions 1.0 and below suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | a94fc6ada9215af3b9c12b526ca1db6c722c36309ffc963b5185a2dbfcbcb1a5
Drupal Embedded Media Field Cross Site Scripting
Posted Dec 9, 2010
Authored by Justin C. Klein Keane

Drupal 6.19 with Embedded Media Field 6.x-1.25 and CCK 6.x-2.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 942aa53253a2fea2261b05afd7ad82385ca049ed6118c536ad6802209f62795c
HP Security Bulletin HPSBUX02612 SSRT100345
Posted Dec 9, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02612 SSRT100345 - Potential security vulnerabilities have been identified with HP-UX Apache-based Web Server. These vulnerabilities could be exploited locally to disclose information, increase privilege or remotely create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, web, denial of service, vulnerability
systems | hpux
advisories | CVE-2010-1452, CVE-2009-1956, CVE-2009-1955, CVE-2009-1891, CVE-2009-1890, CVE-2009-1195, CVE-2009-0023, CVE-2007-6203, CVE-2006-3918
SHA-256 | b1f190998016e144317781b119e85f9b8dd0c136204c8fe53bffb4d260a8e398
CA Technologies Remote Code Execution
Posted Dec 9, 2010
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies support is alerting customers to a security risk with CA XOsoft. A vulnerability exists that can allow a remote attacker to execute arbitrary code. CA has issued a patch to address the vulnerability for each affected release. The vulnerability is due to insufficient bounds checking with a SOAP request. A remote attacker can make a SOAP request to cause a buffer overflow and potentially compromise the system.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-3984
SHA-256 | 9d039f55b21c958375378d4ba47477b52c27a168b01375bd467fcfa9414e7265
Secunia Security Advisory 42471
Posted Dec 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for krb5. This fixes multiple vulnerabilities, which can be exploited by malicious users and malicious people to conduct spoofing attacks and bypass certain security features.

tags | advisory, spoof, vulnerability
systems | linux, fedora
SHA-256 | 638cbac911a3ea46ee1306ce5d9d7d4a6f8a1d5a1de85a351082542514571d91
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close