what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

BlogEngine 3.3 XML External Entity Injection
Posted Jan 9, 2019
Authored by Mustafa Yalcin | Site netsparker.com

BlogEngine version 3.3 suffers from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2018-14485
MD5 | 158c165dcd25c8de8be755c65883778b

Related Files

BlogEngine.NET 3.3.6 / 3.3.7 path Directory Traversal
Posted Jun 25, 2019
Authored by Aaron Bishop

BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from a path directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | bfe95ac05c7d56a481cbc5285b597336
BlogEngine.NET 3.3.6 / 3.3.7 XML Injection
Posted Jun 20, 2019
Authored by Aaron Bishop

BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2019-10718
MD5 | fdea6782e2dd354a53cef938e93cf070
BlogEngine.NET 3.3.6 / 3.3.7 Theme Cookie Directory Traversal / Remote Code Execution
Posted Jun 19, 2019
Authored by Aaron Bishop

BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from theme Cookie directory traversal and remote code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
advisories | CVE-2019-10720
MD5 | 888d7c169f3e6e9a215b1eceffb103b7
BlogEngine.NET 3.3.6 / 3.3.7 dirPath Directory Traversal / Remote Code Execution
Posted Jun 19, 2019
Authored by Aaron Bishop

BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from dirPath directory traversal and remote code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
advisories | CVE-2019-10719
MD5 | f53272715e0e3639f8c26fa46102e350
BlogEngine.NET 3.3.6 Directory Traversal / Remote Code Execution
Posted Feb 12, 2019
Authored by Dustin Cobb

BlogEngine.NET version 3.3.6 suffers from code execution and directory traversal vulnerabilities.

tags | exploit, vulnerability, code execution, file inclusion
advisories | CVE-2019-6714
MD5 | 5d60a05646610a370fa6e7cddfe9d0f6
Secunia Security Advisory 42825
Posted Jan 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in BlogEngine.NET, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 172e15c5cce5c54a87eb7083e23aab06
BlogEngine.NET Unauthorized Access / Directory Traversal
Posted Jan 5, 2011
Authored by Deniz Cevik

BlogEngine.NET version 1.6.x suffers from path disclosure, unauthorized access, directory traversal, and file upload vulnerabilities.

tags | exploit, vulnerability, file inclusion, file upload
MD5 | 090fb9d385e3b6e1d3e28bdfa2bb1e7b
Secunia Security Advisory 39779
Posted May 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has reported a vulnerability in the Cumulus widget for BlogEngine.NET, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 77398acad212fdb17b8f27bc2699cce2
Cumulus Widget For BlogEngine.NET Cross Site Scripting
Posted May 12, 2010
Authored by MustLive

The Cumulus widget for BlogEngine.net suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a2072c1cffd910864fd712ea61ad4540
nsniff-0.1.2.tar
Posted Jul 29, 2003
Authored by sac, LexLufix | Site sac.cc

Packet capturing and network monitoring tool. Contains all the basics for monitoring network traffic. Tested on NetBSD and Linux. v0.1.2

systems | linux, netbsd
MD5 | ee826c2b1b9bd46d13c2036a2590b11c
nsniff-20021019.tar
Posted Jul 27, 2003
Authored by sac, LexLufix | Site sac.cc

Packet capturing and network monitoring tool. Contains all the basics for monitoring network traffic. Tested on NetBSD and Linux.

systems | linux, netbsd
MD5 | b8be3f88fe6a4b0f2edca385915798f9
NSSA-200305.txt
Posted May 31, 2003
Authored by NSFOCUS | Site nsfocus.com

A buffer overflow vulnerability exists in the way a dynamic linking library (ssinc.dll)that is shipped with Microsoft IIS 4.0/5.0 handles the files it contains. Exploiting the vulnerability, local attackers could gain local system privileges.

tags | advisory, overflow, local
MD5 | f9be980a2327c68bcbad02560bc941db
nsat-1.5.tgz
Posted Jan 6, 2003
Authored by Mixter | Site 1337.tsx.org

Nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, nsat can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

Changes: New compilation option to support scanning with POSIX threads instead of fork to enhance performance, compilation / stability fixes, and updated timing values. Ping dependence is now disabled by default.
tags | tool, remote, scanner, vulnerability
systems | unix
MD5 | ba7f5bbc476bc937c16e3654a8e0a666
nslconf.c
Posted Sep 30, 2002
Authored by RaiSe | Site netsearch-ezine.com

Linuxconf v1.28r3 and below local exploit which uses the ptrace method to find the offset. Tested on Mandrake 8.0 and 8.2, and Redhat 7.2 and 7.3.

tags | exploit, local
systems | linux, redhat, mandrake
MD5 | d7351358fc20587891f1f8c16b558242
nsa1_1.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 80360dfc8c13cd1999a30c6402500820
nsa1_2.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 35c941112faadc3b741ea046d3d8fe99
nsa1_3.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 2b20dfa55c4a2d54d22c83dc2c243b23
nsa1_4.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 0a81f140ff86ca75fc850b9b6e424fde
nsahbook.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | a87168d9eae4f7615a23ffe90c8a6e91
nsa_1984.gif
Posted Aug 26, 2002

1984: The NSA is behind schedule.

tags | bbs
MD5 | 8216f4b54f567c5f418bf52e12a14f8c
nssilabs-keriosecvuln.txt
Posted Aug 21, 2002
Authored by Abraham Lincoln Hao | Site nssilabs.nssolution.com

NSSI Research Labs Security Advisory - Kerio Mail Server v5.x for Windows contains multiple denial of service and cross site scripting vulnerabilities in all mail services and the web mail module of the mail server.

tags | web, denial of service, vulnerability, xss
systems | windows
MD5 | 5a14427f3c783970843f37f0df069083
nssi.tpfw.txt
Posted Aug 21, 2002
Authored by Aaron Tan Lu | Site nssolution.com

NSSI Research Labs Security Advisory NSSI-2002-tpfw - The Tiny Personal Firewall 3.0 for Windows contains contains denial of service vulnerabilities in the activity logger tab of the Personal Firewall Agent module which allow remote attackers to crash the OS, consuming 100% of the CPU.

tags | remote, denial of service, vulnerability
systems | windows
MD5 | 0d047930124279f574a2c39f7d5a8568
nstalker-chunked.c
Posted Jun 29, 2002
Authored by Thiago Zaninotti | Site nstalker.com

Apache Chunked Transfer vulnerability scanner. Does not check the banner - crashes a thread and watches the web server behavior.

tags | tool, web, scanner
systems | unix
MD5 | 91b79acdbd9a0e019f42e41596d420a6
nsat-1.43.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: New IDS evasion for HTTP (some whisker types), a webscan-only config file, and some code cleanups.
tags | tool, remote, scanner, vulnerability
systems | unix
MD5 | 9613f5bcc1a9bc7afd4016caeacb3739
nsfocus.xsun.txt
Posted Apr 6, 2002
Site nsfocus.com

Nsfocus Security Advisory SA2002-02 - Xsun, shipped with Solaris 2.6, 2.7, and 2.8 contains a local root vulnerability due to a heap overflow in the -co options.

tags | overflow, local, root
systems | solaris
MD5 | b1cea44377038e7d2125c5ea1743fe13
Page 1 of 4
Back1234Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close