exploit the possibilities
Showing 1 - 25 of 52 RSS Feed

Files Date: 2011-05-31

ZoneMinder Video Camera Security Tool 1.24.4
Posted May 31, 2011
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: This release primarily addresses a number of system and configuration issues that arose from 1.24.3, but also includes significant improvements to version management and upgrades.
tags | web
systems | linux, unix
MD5 | f34331325c5efd47197eca902976c93d
Guru JustAnswer Professional 1.25 SQL Injection
Posted May 31, 2011
Authored by v3n0m

Guru JustAnswer Professional version 1.25 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | d7771e297caa5d610e3a0e1998993869
iPhone4 FTP Server 1.0 Remote Crash
Posted May 31, 2011
Authored by offsetIntruder

iPhone4 FTP Server 1.0 empty CWD-RETR remote crash denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 79657b665e9fa419c1fae8360ff6512f
Revese Engineering And Memory Patching
Posted May 31, 2011
Authored by Richard Davy

Whitepaper called Reverse Engineering and Memory Patching.

tags | paper
MD5 | ba1a9d660098c022850547bdb0e9943f
Joomla 1.6.x Administrator PHP Code Execution
Posted May 31, 2011
Authored by James Bercegay | Site gulftech.org

This Metasploit module can be used to gain a remote shell to a Joomla! 1.6.x install when administrator credentials are known. This is achieved by uploading a malicious component which is used to execute the selected payload.

tags | exploit, remote, shell
MD5 | 770f64482cd13284a81000f0afe6bddb
Joomla 1.6.0 SQL Injection
Posted May 31, 2011
Authored by James Bercegay | Site gulftech.org

A vulnerability was discovered by Aung Khant that allows for exploitable SQL Injection attacks against a Joomla 1.6.0 install. This exploit attempts to leverage the SQL Injection to extract admin credentials, and then store those credentials within the notes_db. The vulnerability is due to a validation issue in /components/com_content/models/category.php that erroneously uses the "string" type whenever filtering the user supplied input. This issue was fixed by performing a whitelist check of the user supplied order data against the allowed order types, and also escaping the input.

tags | exploit, php, sql injection
advisories | CVE-2011-1151
MD5 | b819205651e4caec804b0148a1d22d71
Kentico CMS 5.5R2.23 Cross Site Scripting
Posted May 31, 2011
Authored by LiquidWorm | Site zeroscience.mk

Kentico CMS versions 5.5R22.23 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | c22edd73b708209a777319388b6c9d45
FestOS <= 2.3c TinyBrowser File Upload Code Execution
Posted May 31, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
MD5 | a474da5b9be867cdebee725b28be40fb
GloDerWorks SQL Injection
Posted May 31, 2011
Authored by Kalashinkov3

GloDerWorks suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | d48b24a2e088c09d886171467bc9b073
Allied Telesis Divulges Secret Backdoor
Posted May 31, 2011
Site h-online.com

Allied Telesis accidentally divulged secret backdoors in all of their products.

tags | advisory
MD5 | 1d06373d3288eb8f6673834b870f325b
Belkin G Wireless Router 5.00.12 Password Hash Disclosure
Posted May 31, 2011
Authored by Aodrulez

Belkin G Wireless Router with firmware version 5.00.12 suffers from a password hash disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 0b0b24201b67df4507c45b4baae53759
HTTPConsole 1.0.0.0 For Windows
Posted May 31, 2011
Authored by AutoSec Tools | Site autosectools.com

This is an HTTP console to remote administer Windows hosts with a browser-based, AJAX-enabled, command-line interface. Server requires .NET 3.5. Written in C# and JavaScript.

tags | remote, web, javascript
systems | windows
MD5 | bca2d252dec2fdc40cb4c285d0c3b57a
7-Technologies IGSS 9 Data Server/Collector Packet Handling
Posted May 31, 2011
Authored by Luigi Auriemma, sinn3r | Site metasploit.com

This Metasploit module exploits multiple vulnerabilities found on IGSS 9's Data Server and Data Collector services. The initial approach is first by transferring our binary with Write packets (opcode 0x0D) via port 12401 (igssdataserver.exe), and then sending an EXE packet (opcode 0x0A) to port 12397 (dc.exe), which will cause dc.exe to run that payload with a CreateProcessA() function as a new thread.

tags | exploit, vulnerability
MD5 | 2b8a3b2a358404af9856bc15f95108a4
Websolutions SQL Injection
Posted May 31, 2011
Authored by Kalashinkov3

Websolutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 76d87afb1a59cc88f7a5868a6bd9369a
Secunia Security Advisory 44742
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Guru JustAnswer Professional, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 4a8d2b90198029c0249dd22097390244
Secunia Security Advisory 44687
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for unbound. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
MD5 | 70d4bb653838ba92dbe0e6b77a1d218e
Secunia Security Advisory 44746
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the sh404SEF component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 5443bc3e7fb33b50428788dab9e334b7
Secunia Security Advisory 44763
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for pam. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information and perform certain actions with escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
MD5 | 9054e5a3ce7aedb1d239fa1c316ddb1c
Secunia Security Advisory 44761
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | a33d7c3ce2949777f62d182889f6f5c1
Secunia Security Advisory 44760
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Ajax File Manager plugin for TinyMCE, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 75fc10655a201bfdd3cc51a776ce430f
Secunia Security Advisory 44762
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 60868971cd300c719ce7a51b2218b737
Secunia Security Advisory 44628
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Management Framework, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 437c22b6304dd6866176a81f94d7033e
Secunia Security Advisory 44747
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
MD5 | a4a8f93ab79fbca9778370321c9bbc23
Secunia Security Advisory 44720
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Puzzle Apps CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d06329ba85d5a4f2ed133c557773eb4a
Secunia Security Advisory 44744
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, slackware
MD5 | 9111b1523463cbf77015b7a3d63a2b33
Page 1 of 3
Back123Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close