what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed


Facebook And Google Reviews System For Businesses 1.1 SQL Injection
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | abe1646707d467935c7ac7c16532d838

Related Files

Facebook And Google Reviews System For Businesses 1.1 Code Execution
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | 27b25a71e7b37c82f8af9b94139ec222
Facebook And Google Reviews System For Business 1.0 CSRF
Posted Dec 14, 2018
Authored by Veyselxan

Facebook And Google Reviews System For Business version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 79754b5cae2b5220c3bc684604855950
CloudFlare Versus Incapsula: Round 2
Posted Oct 30, 2013
Authored by LiquidWorm, Humberto Cabrera, Stefan Petrushevski | Site zeroscience.mk

This document contains the results of a second comparative penetration test conducted by a team of security specialists at Zero Science Lab against two cloud-based Web Application Firewall (WAF) solutions: Incapsula and Cloudflare. This test was designed to bypass security controls in place, in any possible way, circumventing whatever filters they have. Given the rise in application-level attacks, the goal of the test was to provide IT managers of online businesses with a comparison of these WAFs against real-world threats in simulated real-world conditions.

tags | paper, web
MD5 | e34c141844b6ea5bac3471427cb3e902
SIEMENS Sipass Integrated 2.6 Ethernet Bus Arbitrary Pointer Dereference
Posted Oct 31, 2012
Authored by Lucas Apa | Site ioactive.com

IOActive Security Advisory - A vulnerability exists within AscoServer.exe of SIEMENS SiPass during the handling of RPC messages over the ethernet bus. Insufficient sanity checking allows remote and unauthenticated attackers to corrupt a heap-allocated structure and then dereference an arbitrary pointer. This flaw allows remote attackers to execute arbitrary code on the target system, under the context of the SYSTEM account, where the vulnerable versions of SIEMENS SiPass Integrated are installed. More advanced payloads could modify the behavior of the application’s internal controllers to unlock doors, control specific hardware, or expose businesses to other security risks. SIEMENS SiPass Integrated versions MP2.6 and earlier are affected.

tags | advisory, remote, arbitrary
MD5 | bceeb6efc7866fc0a0b737275cd26121
Site2nite Businesses For Sale Listings SQL Injection
Posted Nov 3, 2010
Authored by L0rd CrusAd3r

Site2nite Businesses For Sale Listings suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b6add849b1c048b9f7ca68a1b10bb123
Posted Dec 12, 2007
Site aanval.com

Aanval Basic is the light-weight alternative to the full Aanval Snort and Syslog. Aanval is the leading web-based snort and syslog interface for correlation, management and reporting. Capable of handling more than 1+ Billion events, Aanval has been protecting Domestic and Foreign Governments, Fortune 50 Enterprises, Global Financial Institutions and local Small Businesses since 2003.

tags | tool, web, local, sniffer
MD5 | 0f963cbf65655c655a4da41870d5650c
Posted Dec 11, 2004
Site shirkdog.us

An attacker can change hidden fields to any dollar amount and misrepresent purchases for businesses providing products or services using the PayFlow Link system.

tags | advisory
MD5 | 3a582e3b889a0f3d8bee282de181ea1d
Posted May 18, 2000
Authored by winsd | Site win2000mag.com

Windows Security Digest - May 17, 2000. In this issue: Backpedaling towards security, SECURITY RISKS: Emurl 2.0 exposes Users' Mailboxes, Office 2000 UA Control Scripting, NTMail 5.x Contains an Open Proxy, IIS Denial of Service and Code Exposure, IIS Denial of Service. SECURITY ROUNDUP: Feature:NTFS Access Control Security Enhancements, HowTo: Encrypting Files for Added Security. NEW AND IMPROVED: Message Attachment Scrubbing and Virus Protection, Increase Network Security in Small and Midsized Businesses. SECURITY TOOLKIT: Book Highlight- Cyberwars: Espionage on the Internet, Tip: Detecting Email Worms in Outlook.

tags | worm, denial of service, virus, magazine
systems | windows
MD5 | 4ac08f7385cb9f73e8af2cfa97e438ef
Posted Jan 2, 2000
Authored by Stefan Folkerts | Site trailer.linuxatwork.at

Squidtaild is a Squid log file monitoring program that will crosscheck new access.log entries with user-defined filters and report all hits (using HTML pages, email, or winpopups). It is ideal for schools and businesses that wish to monitor their Internet activity for policy violations (that can be custom generated).

Changes: This complete Perl rewrite of Trailer is faster, more flexible, and offers more options.
tags | system logging
systems | unix
MD5 | acb093fb1deb708a979e894d77166a1e
Posted Oct 1, 1999
Authored by Paul Ducklin | Site sophos.com

This White Paper gives an introduction to computer security and its significance for businesses, followed by an alphabetical guide to common security measures and threats.

tags | paper
MD5 | 234140dc38979cbe235a915f9e495f15
Posted Aug 17, 1999

99 of the Technologies (hardware, software, networking), Companies, Internet Businesses and Policies, People, and User Strategies that you should watch and/or get involved (or avoid) in '99. Internet Week Magazine.

tags | paper
MD5 | e73c80d0b34e04c4a297e182bc01ca5e
Posted Aug 17, 1999

Word list created from businesses with 800 numbers. (64574 words)

tags | cracker
MD5 | 35019ecf8ce05099f16ceaec7ad9a92c
Posted Aug 17, 1999
Authored by Stefan Folkerts, Johan Fitie

Trailer v2.1 is a console/html/email Squid log file monitoring program that will crosscheck the new access.log entrys in this file with wildcards and report all hits. It will also monitor the number of client requests, and much more. It is ideal for schools and businesses that wish to monitor their internet activity.

tags | system logging
systems | unix
MD5 | b47c2c853120acb842b29a779b330bc4
Page 1 of 1

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By