what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2011-04-10

Sec-Wall Security Proxy 1.0.0
Posted Apr 10, 2011
Authored by Dariusz Suchojad | Site sec-wall.gefira.pl

sec-wall is a high-performance security proxy that supports SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching/rewriting, and an optional header enrichment. It's a security wall with which you can conveniently fence otherwise defenseless backend servers.

Changes: This initial release includes support for SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching and rewriting, and optional header enrichment. All of these features are very well tested and properly documented.
tags | web
systems | unix
SHA-256 | 0297ae5a5ab72b01968fb6f36953dc782b1dc5fc91df7729923b47036aaad7da
Security Auditor's Research Assistant (SARA) 7.9.2a
Posted Apr 10, 2011
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Assorted bugfixes and updates to detect newer potential security issues.
tags | tool, cgi, scanner
systems | linux, unix
SHA-256 | 4f6734be7ebcb6915b3be8941eceac5de5f8d76c53fb96a2efab212596f57290
Creepy Geolocation Gathering Tool 0.1.93
Posted Apr 10, 2011
Authored by Yiannis Kakavas | Site ilektrojohn.github.com

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Changes: This release adds Gowalla support. It fixes a bug that produced false positives with locations at (0,0). It fixes a couple of packaging bugs in the Windows version.
tags | tool
systems | unix
SHA-256 | 7afb4f1452cf277205994b8d4188fdd0756b4e03468aa7edd6f3035f895cd620
NooMS CMS 1.1.1 Cross Site Request Forgery
Posted Apr 10, 2011
Authored by loneferret

NooMS CMS version 1.1.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 482e795dcaa8cfd6fa1d0087c2460ed808a453fb1acc42c86eca0a4b3bf412d3
IrfanView 4.28 .ICO Without Transparent Colour Denial Of Service
Posted Apr 10, 2011
Authored by BraniX

IrfanView version 4.28 .ICO file without transparent colour denial of service exploit.

tags | exploit, denial of service
SHA-256 | 0b08bcd459993385237d031eb341a2acac82577acd468f0dcd6b9d813bb7154a
IrfanView 4.28 .ICO With Transparent Colour Denial Of Service
Posted Apr 10, 2011
Authored by BraniX

IrfanView version 4.28 .ICO file with transparent colour denial of service exploit.

tags | exploit, denial of service
SHA-256 | 3a63a85f18060a1bd03245f0f21730729638010886e098858a173c8b21e84f9c
AgentSmith Log Monitor 0.2
Posted Apr 10, 2011
Authored by Rafael Ostertag | Site guengel.ch

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

Changes: New features are IP address exclusion and exchange of host information between remote agentsmith instances.
tags | remote
systems | unix
SHA-256 | 38f56dbf017f6cb260c4abf55f422fe540e95a4058f589a88f6314183e1d8435
Sonexis ConferenceManager 9.3.14.0 Blind SQL Injection
Posted Apr 10, 2011
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Sonexis ConferenceManager version 9.3.14.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1f9f92a63ad712d5bdad484011567b4dc9edf18843008ce146b3c460e4a79e40
DimacCMS XS 1.3 SQL Injection / Database Disclosure
Posted Apr 10, 2011
Authored by KedAns-Dz

DimacCMS XS versions 1.3 and below suffer from remote SQL injection and database disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 3578527c3669dcf56dd7df9d8dea276e19488e02ba6044b18b4d69aa67e98291
Croogo 1.3.3 DBconfig Download
Posted Apr 10, 2011
Authored by KedAns-Dz

Croogo versions 1.3.3 and below suffer from a remote database configuration download vulnerability.

tags | exploit, remote
SHA-256 | 5b14f73ea62b7dd58d436e714b685da218f537af9750f694a870442ca571a519
Point Market System 3.1x SQL Injection
Posted Apr 10, 2011
Authored by Net.Edit0r

vBulletin plugin Point Market System version 3.1x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9dd6ddefa3f42971e834a1ba0b5352a7146288deb26c203dba0297a59e5ad117
Pars IT SQL Injection
Posted Apr 10, 2011
Authored by d3c0der

Pars IT suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3b15397a27fca5d352d4b016ee2b4f6feac94fef6cdddf80daa2e122ec91d7cb
PHP-Jokesite 2.0 Blind SQL Injection
Posted Apr 10, 2011
Authored by kurdish hackers team | Site kurdteam.org

PHP-Jokesite version 2.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | e11630a6d338e07c08ae1ad4078e625d7beca31121bc6455c716096b899e27b6
Drupal 7.0 Shell Execution
Posted Apr 10, 2011
Authored by KedAns-Dz

Drupal version 7.0 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | ae379d3ee6258d3421cda34112b5c194d06dfda66bb8a74d6d48cea995174149
Debian Security Advisory 2215-1
Posted Apr 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2215-1 - Dylan Simon discovered that gitolite, a SSH-based gatekeeper for git repositories, is prone to directory traversal attacks when restricting admin defined commands (ADC). This allows an attacker to execute arbitrary commands with privileges of the gitolite server via crafted command names.

tags | advisory, arbitrary
systems | linux, debian
SHA-256 | f0580b051580bb59808c5fce70bdee19bf92436a814b5f95dd720c6165393e51
PHP-Lance 1.52 Blind SQL Injection
Posted Apr 10, 2011
Authored by kurdish hackers team | Site kurdteam.org

PHP-Lance version 1.52 suffers from remote blind SQL injection vulnerabilities.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | afb5d08ab4c51881f12f198bc41fe04671736acd7032aecc7c306d78a771afda
OpenPuff Steganography Tool 3.10
Posted Apr 10, 2011
Authored by Cosimo Oliboni

OpenPuff is a professional military-strength steganography tool that supports 16 algorithms, has a strong random number generator, supports many carrier formats, and more.

tags | encryption, steganography
SHA-256 | 419c918cf20de6ab4c071934463bd1d1e5dcfcaf4182cf945b1a2619a358e5f4
Registry String Wiper
Posted Apr 10, 2011
Authored by Paolo Iorio | Site paoloiorio.it

This windows binary is a lightweight tool for removing strings in the Windows registry.

tags | registry
systems | windows
SHA-256 | 930084f1b07b611ad257a6cfe7c757a97c1013ed722666b27d57b5aa114e5604
Secunia Security Advisory 44077
Posted Apr 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered some vulnerabilities in Viscacha, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 5f96d98503bf774752c2e391edb1cfea26c6aeaa2dd1bddb5c92edc0b78a8630
Secunia Security Advisory 44083
Posted Apr 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HAProxy, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6f9b5f7fa1474e7bfb42732af09c14b81ca4a381eac27c592b3d3256918d32b0
Secunia Security Advisory 44074
Posted Apr 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for python-feedparser. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and conduct script insertion attacks.

tags | advisory, denial of service, vulnerability, python
systems | linux, suse
SHA-256 | 784e093a4dbfedcaaa38cf1ba2a46fc093fcc6e95df27f64bb55f1e6ba141736
UCLA University SQL Injection
Posted Apr 10, 2011
Authored by H3X, W!Z4RD

UCLA University suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 85b9e991ed7fd5c93502b171685de1493b1290b3d2a88583118a0028ee9fa76d
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close