exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2011-01-03 to 2011-01-04

Geeklog 1.7.1 Cross Site Scripting
Posted Jan 3, 2011
Authored by Aung Khant | Site yehg.net

Geeklog versions 1.7.1 and below suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1b979762b859d905fddef4be41425f3a8b45b94c6c62eb1b21c221875e6e0457
WikLink 0.1.3 SQL Injection
Posted Jan 3, 2011
Authored by Aliaksandr Hartsuyeu | Site evuln.com

WikLink version 0.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 83231be61318a4cc316ea30caa43edaa3eb39bf20b3d570bcceedaa9833242f5
Witchxtool Port / LFI / SQL Scanner And MD5 Bruteforcing Tool 1.0
Posted Jan 3, 2011
Authored by th3_w1tch | Site makassarhacker.com

Witchxtool is a perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 3b07ac2beb17d889bb29196cd4ad335e183a17bfc2253989f49fea5b942a80ef
YourTube 1.0 Cross Site Request Forgery
Posted Jan 3, 2011
Authored by AtT4CKxT3rR0r1ST

YourTube version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ea652490d92d15c7bf837ef80b280f790141dd77b8a742e68175305d6b521589
Sahana Agasti 0.6.4 SQL Injection
Posted Jan 3, 2011
Authored by dun

Sahana Agasti versions 0.6.4 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c43b0c9ca78cd8229308c5d4edb24c33144301e739d1ef9fd747857df7113230
Wireshark ENTTEC DMX Data RLE Buffer Overflow
Posted Jan 3, 2011
Authored by non-customers

Proof of concept exploit code for the Wireshark ENTTEC DMX Data RLE buffer overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | ab4e86cb09f3f6abe77b83c259fc1059c86161620ebef87a22f212c683a30117
HPing3 Cheatsheet
Posted Jan 3, 2011
Authored by Alejandro Ramos

This is a simple hping3 cheatsheet.

tags | paper
SHA-256 | 4f16370618a571e79dec6749a74f7fea65adfce757efd40758cd3cabecd27131
Neurosurgery With Meterpreter
Posted Jan 3, 2011
Authored by Colin Ames

Whitepaper called Neurosurgery With Meterpreter.

tags | paper
SHA-256 | ce69e6b27a193f7d23105abe6f949ac1608d9c962e40f894645775beef5e5d88
Network Security Policy Compiler 3.2
Posted Jan 3, 2011
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Generated code for Linux iptables is highly optimized now. Deeply nested chains are used to minimize the number of tests for each checked packet. Support has been added for Cisco ASA devices as packet filter, VPN gateway, and for LAN-to-LAN IPSec tunnels. A new option to generate outgoing access lists has been added. Many other improvements and bugfixes have been applied.
systems | unix
SHA-256 | ea053436cd1ab9bb0cc729820cfbddf3c683e8b3d78baca678b30f73156d22c7
GALLARIFIC PHP Photo Gallery Script SQL Injection
Posted Jan 3, 2011
Authored by AtT4CKxT3rR0r1ST

GALLARIFIC PHP Photo Gallery script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 7b5b578c1c3d7418752c278134ee42b0aacecc770f4ded4254b4b1003c2f9643
Secunia Security Advisory 42767
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 26bfdd7277465a070a3edd7ccdac6bda477f51738cfc7bfbfdde18fcd75599b0
Secunia Security Advisory 42776
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in RocketLife, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 02d7369fa55d7b1082c38274bc1c015205a62652bbffaf299eeabb8a8f3137ad
Secunia Security Advisory 42770
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in HP Photo Creations, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9f93638dfad75211f2b1dbea3c442f51a78b0863a8b97167cd4d0c96196b1866
14 CMS 3.0.1 Blind SQL Injection
Posted Jan 3, 2011
Authored by Elvl000

14 CMS version 3.0.1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 084395b66a7d9390449eab14b0a10686298efae5b941d4d3593bc41db4743578
Secunia Security Advisory 42795
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Sahana Disaster Management System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 0a0c80f656c39c89bb561107271e0374a1c96f0b1ecd9b0edcf85294bc5036b0
Secunia Security Advisory 42773
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 601234523b6ea8797aa476538c4053da3ea0d00eb12971b49008e1cf688277a3
Secunia Security Advisory 42725
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for phpmyadmin. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to conduct spoofing and cross-site scripting attack and disclose system information.

tags | advisory, spoof, xss
systems | linux, debian
SHA-256 | 2fbdfa7292761044673af5df1c9e776daa483c834adaaec12370e5fc4491bf1d
Secunia Security Advisory 42771
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Gimp, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | ba65d8ca637dd49280e6e34bfee7efd42aa112b69468616c7ee401dd08aa51b0
Secunia Security Advisory 42797
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in ChurchInfo, which can be exploited by malicious users to conduct SQL injection attacks and malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, sql injection, csrf
SHA-256 | 14f2c79582bdea0b4b391aa1a02fe062c1bb047847293526a9d07edc7c887f56
Secunia Security Advisory 42772
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | 8f358cbf2bb9f4c052957d236758caf84107c949970b61fc7be0fca4926fd13e
Secunia Security Advisory 42792
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gallarific, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2568a96686d77a28b7936833cbad5a56666ddea759cfedfcd85b6e9a2f2b6e62
Secunia Security Advisory 42801
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | 0c9ee2072d8770d11808d97159e07b7d81b301ffc21eb141f191740987507d16
Secunia Security Advisory 42778
Posted Jan 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | 0bd42b4cebb1e8a8c5a383525eb0ae92667414ddd6270d9129bfb2f9229532cc
Sahana Agasti 0.6.4 Remote File Inclusion
Posted Jan 3, 2011
Authored by n0n0x

Sahana Agasti versions 0.6.4 and below suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 9c6c00151ca7d312fc53f3f750376a725230438fbaca35268308626664241d91
Music Animation Machine MIDI Player Proof Of Concept
Posted Jan 3, 2011
Authored by c0d3R'Z

Music Animation Machine MIDI player local crash proof of concept denial of service exploit.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 35d82aa5696b9e418fbb1c119204e709325e41fb97700ab98a96cc540f125d91
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close