exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2011-05-15

GNU SIP Witch Telephony Server 1.0.0
Posted May 15, 2011
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: This release is intended to provide a stable release family to power existing secure calling services for public and private use while GNU Free Call services are developed for sipwitch 2.0.
tags | telephony
systems | unix
SHA-256 | bff01b00a04b4f8d246cef236da44a4b42ee12eab2af28f943e5c55dfca9f9ce
Bluelog Bluetooth Scanner/Logger 0.9.9
Posted May 15, 2011
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This is a major rewrite. Completely revamped device cache code is faster and more accurate while preventing redundant scans. New features such as Amnesia mode and preliminary OpenWRT support. Numerous bugfixes and optimizations. A recommended update for all users.
tags | tool, web, wireless
systems | unix
SHA-256 | b550fa0e8a230d9853f83957883cc98734340423e2d3c98de6b1321a7684d903
SSLDiagnos 0.8.1b
Posted May 15, 2011
Authored by James Dickson | Site sourceforge.net

This application is used to test SSL ciphers/protocols. It has some specific functionality for sip, ftps, pop3 and smtp and also tests for renegotiation. The binaries (in the debug-folder) ships with OpenSSL 1.0c dlls for win32. A separate test-tool enables testing for all possible ciphers allowed by protocols (not just OpenSSL-recognized-ciphers). Now there are also some tests for the Microsoft PCT protocol.

Changes: Various updates.
tags | encryption, protocol
systems | windows
SHA-256 | 3f5edc67e2bf1a610ff4effe46bd02077cc82f2e9d60bb223f1800495451b920
Debian Security Advisory 2237-1
Posted May 15, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2237-1 - A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. If a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2011-0419
SHA-256 | c23f7d122bf00732fd57c168870b2d9b88cfca00ec85f779d9841ab56b4fcd1f
PG Auto Pro Classifieds Software Shell Upload
Posted May 15, 2011
Authored by kaMtiEz | Site indonesiancoder.com

PG Auto Pro Classifieds Software suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | aa6136a0296c7b892f169c6178c036c8b7ddb207e47aeaf93a1bd3b0291f8e0e
Joomla CBContact SQL Injection
Posted May 15, 2011
Authored by KedAns-Dz

The Joomla CBContact component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4a9ec2cd447451887801fcb8aaf995601129061efceb26504ba594e3378d40da
Joomla Docman SQL Injection
Posted May 15, 2011
Authored by KedAns-Dz

The Joomla Docman component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6d3744813146629dc5c7499a9365630f57394de9c64ef224f03c922e8c1fe5ec
Cetera eCommerce 15.0 SQL Injection / Disclosure
Posted May 15, 2011
Authored by MustLive

Cetera eCommerce versions 15.0 and below suffer from remote SQL injection, path disclosure, abuse of functionality, and insufficient anti-automation vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 46559a0a5ad8a70d0e362aca830096f05e532325c2a19d31c4f45fafd294a481
osCommerce 2.3.1 Shell Upload
Posted May 15, 2011
Authored by Number 7

osCommerce version 2.3.1 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 6f77547245e4435487ff50cceecb12db25a0c48462dd2c5fb75464bdad739078
Winamp 5.61 Heap Overflow
Posted May 15, 2011
Authored by Alexander Gavrun

Winamp version 5.61 suffers from an in_midi component heap overflow vulnerability. Crash proof of concept included.

tags | exploit, overflow, proof of concept
SHA-256 | 4e587b2065afe9000d5eadcffc9ee680db5536ffe5b1558ebc5d6f888035f8f8
Joomla Question SQL Injection
Posted May 15, 2011
Authored by NeX HaCkeR

The Joomla Question component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6dd418f0a740678b728f1f1f691bc57f817b982b0d5d0a21edb1a6c1ba886caf
Frame-Oshop SQL Injection
Posted May 15, 2011
Authored by SmoG

Frame-Oshop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e5e6c29ea045432ad5571a6978aa271ee56254dfa2c0de21dbffb97f733bcd80
Linux Exploit Development Part 4
Posted May 15, 2011
Authored by sickness

Whitepaper called Linux exploit development part 4 - ASCII armor bypass + return-to-plt.

tags | paper, bypass
systems | linux
SHA-256 | c0d19856fa4074f5a2b533a159aa2d90413ff00bcab1ec6123d510643abeef1a
Digital Whisper Electronic Magazine #20
Posted May 15, 2011
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 20. Written in Hebrew.

tags | magazine
SHA-256 | 4ae0a3dc6d4aeaab537a68c42badc5f5465c2bed0d047ca82af08c00db1501f5
Digital Whisper Electronic Magazine #19
Posted May 15, 2011
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 19. Written in Hebrew.

tags | magazine
SHA-256 | 55e15149cda5efd4e4ef70a0f7d5295c84f6ad59153e55ef499d69d896971a94
Digital Whisper Electronic Magazine #18
Posted May 15, 2011
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 18. Written in Hebrew.

tags | magazine
SHA-256 | a4f55476ff54ae05baec1d55c57bcac9871057750b76960f118ea512aa095739
Secunia Security Advisory 44433
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mahara, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | b2ad523a660855320a4dfdf5b04377613d8c4625f9d162a180bbb1677c597d31
Secunia Security Advisory 44591
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 47bf67b8f1cc9f9f88a4e8929bef53d141c7024127e4763a96ea6328aa133a21
Secunia Security Advisory 44589
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Adobe Flash Media Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 1246e71c199ef6254cb6eb1932a1b86d821d08abbed5efa1a19718290fea0b79
Secunia Security Advisory 44531
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cronie. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, suse
SHA-256 | ed89b3a17da394ba6be0347df3f71c87f42af94e3eb8da2f8ad009aeef7ac6d8
Secunia Security Advisory 44590
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | cf6ec5bfc49434bf8d8afe191e3c698b9a879a3883d14c9bab6eb21576dadba3
Secunia Security Advisory 44588
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Audition, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 6e68983d7be1dc70baadaf10de89f8ffdb7e16066c0bab556dbc349b3101f1cd
Secunia Security Advisory 44562
Posted May 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Open Classifieds, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | d5adbdad308e46ae770c86d37e83b782a3c5e7dcac79a8599da0c75df4462633
AVS Ringtone Maker 1.6.1 Overflow
Posted May 15, 2011
Authored by KedAns-Dz

AVS Ringtone Maker version 1.6.1 heap and SEH overflow proof of concept exploits.

tags | exploit, overflow, proof of concept
SHA-256 | 22e08a7b1836b4f2fa7a55be2978d9933d002788361eff106426a7eb8c690824
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close