what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 85 RSS Feed

Files

Port Forwarding Wizard 4.8.0 Buffer Overflow
Posted Jul 27, 2020
Authored by Sarang Tumne

Port Forwarding Wizard version 4.8.0 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | d80cc71d902a2f8063701473c1de716c02b83a3515108e0fc11a2f1b0d52a54e

Related Files

IP-Array IPTables Firewall Script 1.1.2
Posted Mar 11, 2016
Authored by AllKind | Site ip-array.sourceforge.net

A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.

Changes: Bugfix - If in interactive mode and the dialog program was used, option lists were truncated.
tags | tool
systems | linux, unix
SHA-256 | 1776a45062cfe3936e51bcfdbca58205ae2d5cbb6213066d96bedbe4afaeeed3
IP-Array IPTables Firewall Script 1.1.1
Posted Mar 11, 2016
Authored by AllKind | Site ip-array.sourceforge.net

A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.

Changes: The interactive mode has been improved. Mainly the dialog program is now also supported. It is now possible to do the xml parsing selectively by category. Also the iptables arguments can now be shown by category. Two hard and some minor bugs were fixed. Minor other tweaks have been done. Documentation was updated.
tags | tool
systems | linux, unix
SHA-256 | 1eb6674824a29608d618180f1fa727b82362b14e344e41eaaad8b4d2c8a6c685
IP-Array IPTables Firewall Script 1.1.0
Posted Feb 25, 2016
Authored by AllKind | Site ip-array.sourceforge.net

A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.

Changes: ipset sets can now be defined in xml. Besides creating sets and adding elements, whole sets can be imported from a file saved in ipset xml output format and elements can be imported from a regular file. This new features also have been built into the interactive mode, allowing the set manipulations to be done in a wizard based manner. The interactive mode and the xml parser have been improved. Minor other tweaks have been done. Some documentation bugs were fixed.
tags | tool
systems | linux, unix
SHA-256 | 5bbc72085a6544c6a411a4a568ee423b7d260fdbef9ffbeca2cc4f4cebc20ba9
IP-Array IPTables Firewall Script 1.0.3
Posted Jan 27, 2016
Authored by AllKind | Site ip-array.sourceforge.net

A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.

Changes: This is a major update to IP-Array. Rules, ruleblocks and their templates are now written in simple XML. Grouping and nesting of iptables tags allows efficient and time saving rule writing. Various other updates have also been added.
tags | tool
systems | linux, unix
SHA-256 | 7ea58743d02ee926623f928ac586bd8f6713d712bf79215153e65bcee7689737
HP Security Bulletin HPSBHF03340 1
Posted May 29, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03340 1 - A potential security vulnerability has been identified with HP ThinPro Linux and HP Smart Zero Core running HP Easy Setup Wizard. The vulnerability could result in local unauthorized access and elevation of privilege on an HP thin client device. Revision 1 of this advisory.

tags | advisory, local
systems | linux
advisories | CVE-2015-2124
SHA-256 | 355c585f8c958b94f6362d293f801561c9df1b4c0315d1c836d83e169585da08
Windows Diagnostic Troubleshooting Wizard Buffer Overflow
Posted Mar 17, 2015
Authored by Nick Prowse

Microsoft Windows Diagnostic Troubleshooting Wizard suffers from buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
systems | windows
SHA-256 | 4cece5e320932e7702b7eabfa2aaeb0ad115b1cfa29142b0be78a1372ac31ad7
CMS Wizard SQL Injection
Posted Jun 8, 2012
Authored by Mr.Gh0st

CMS Wizard suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 52ed2fed6ce6b85786204c6fe3cef0f6ccfc46db20c8d2c40ab56d6bab8fba04
Movable Type Publishing Platform Cross Site Scripting
Posted Feb 24, 2012
Authored by Jonathan Claudius | Site trustwave.com

Movable Type Publishing Platform versions prior to 5.13, 5.07, and 4.38 are affected by a cross site scripting vulnerability. After extracting the Moveable Type CGI files and source files on to a web server, but before the application is fully installed, cross site scripting vulnerabilities are present in the '/cgi-bin/mt/mt-wizard.cgi' page.

tags | exploit, web, cgi, vulnerability, xss
advisories | CVE-2012-1262
SHA-256 | 8884fca39476f536426dc043e4acf681f4550bb0e135c0d0de6141a9f1920af3
CMS Wizard Cross Site Scripting
Posted Feb 22, 2012
Authored by XaDaL

CMS Wizard suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d5bf91300b372e2467fae5ee7025e46bef42f879c5ab0cf4afc9e514b56d62ef
2Wire Password Reset
Posted Jun 28, 2011
Authored by Travis Phillips | Site metasploit.com

This Metasploit module will reset the admin password on a 2wire wireless router. This works by using a setup wizard page that fails to check if a user is authenticated and doesn't remove or block after first access.

tags | exploit
SHA-256 | 91af7c5cfe8ce35ecd823c6e368888d7bb8600a2aae160caf061754e6ac544da
eZip Wizard 3.0 Stack Buffer Overflow
Posted Apr 25, 2011
Authored by fl0 fl0w, jduck, Lincoln | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 3.0 of ediSys Corp.'s eZip Wizard. In order for the command to be executed, an attacker must convince someone to open a specially crafted zip file with eZip Wizard, and access the specially file via double-clicking it. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-1028, OSVDB-52815
SHA-256 | f7cf6b8da01815b33b60d03bf75a15fdc34e7db6f1efa9610628e431ece1a389
RoomWizard Credential Disclosure
Posted Jan 6, 2011
Authored by Sean Lam

RoomWizard suffers from a default password and sync connector credential leak vulnerability. Firmware version 3.2.3 is affected.

tags | exploit, info disclosure
advisories | CVE-2010-0214
SHA-256 | cd571a6d6eac92710b122e7baf4146e0163348b1c380b890746f3484d6c692d5
HP Security Bulletin HPSBMA02605 SSRT100238
Posted Nov 1, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02605 SSRT100238 - A potential security vulnerability has been identified in HP Insight Managed System Setup Wizard for Windows. The vulnerability could be exploited remotely to download arbitrary files. Revision 1 of this advisory.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2010-4103
SHA-256 | 610c40ddcef707331e2b7ed7da30300bad16427ec12843bc5d1473a12cdd5fb9
Secunia Security Advisory 42038
Posted Nov 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Insight Managed System Setup Wizard, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 13900fc059010b7227dd2cff6df9a2a8fa006dc2ccab2138e3b5667336b15ae2
Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Internet Connection Signup Wizard DLL hijacking exploit.

tags | exploit
SHA-256 | 48ee2fa44f4b8de751510aba4e53106abfc05a765d4579c77f071cdeeb0adfbe
Xilisoft Video Converter Wizard 3 OGG Denial Of Service
Posted Aug 17, 2010
Authored by Praveen Darshanam

Xilisoft Video Converter Wizard version 3 suffers from a denial of service vulnerability when processing .ogg files.

tags | exploit, denial of service
SHA-256 | cc27b8eddb7241321d48f7915f53fc8911e9cd44b92b50c60adf686f281b0300
Secunia Security Advisory 40303
Posted Jun 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Subtitle Translation Wizard, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4b76606b4edc85a5b408afd9bbdf4c27ee3bf2b4e9b791acf53c12c0159e45fc
Subtitle Translation Wizard 3.0.0 Proof Of Concept
Posted Jun 23, 2010
Authored by Blake

Subtitle Translation Wizard version 3.0.0 SEH proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 53a08678d8d8e934aedd1d15dbc4def6e16432b41f85da05bdf3b9a5f802643b
Secunia Security Advisory 40197
Posted Jun 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in File Sharing Wizard, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | bddcb3fe9079e6b12106170b1e09ff19021a740de70a5070b362860204496999
File Sharing Wizard 1.5.0 Remote Command Execution
Posted Jun 18, 2010
Authored by b0nd

File Sharing Wizard version 1.5.0 remote command execution exploit.

tags | exploit, remote, overflow
SHA-256 | ea6ea1bdfffb88d3d3250cbef2b0361200b39031cf979d407ec6cf1b646d9fc0
File Sharing Wizard 1.5.0 Buffer Overflow
Posted Jun 16, 2010
Authored by m1k3

File Sharing Wizard version 1.5.0 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 5b3b58bf6df086c07061044c934b2ff463b1cece671d9019bc7dca30e952b148
Joomla FDione Form Wizard 1.0.2 Local File Inclusion
Posted May 14, 2010
Authored by Chip D3 Bi0s

Joomla FDione Form Wizard version 1.0.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 6074f175a4bc9b26da1579635e2f5f7f8c28a7571bb77e76a681a7bb84f8c037
Secunia Security Advisory 39755
Posted May 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Dione Form Wizard component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | a4a013a86002c8c08896ad9f2cd34e6e168cc010bf18d38d92a4ef9b1e5afe06
eZip Wizard 3.0 Buffer Overflow
Posted Apr 6, 2010
Authored by corelanc0d3r, Lincoln

eZip Wizard version 3.0 buffer overflow exploit that creates a malicious .zip file.

tags | exploit, overflow
SHA-256 | f010a2dae64b554d9b39247ff8f0eb04a16bae1238dea7fc4dc4d26fbce69b92
Secunia Security Advisory 39169
Posted Apr 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in eZip Wizard, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f462d5a181d13ffc6b2bb91b89b9a8ce89beb94503031bb34cb9559a6e1c3ec5
Page 2 of 4
Back1234Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close