exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Ampache 4.4.2 Cross Site Scripting
Posted Jul 21, 2021
Authored by Daniel Bishtawi | Site netsparker.com

Ampache version 4.4.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | ac4b9b998efcfeeb7354128b30e3711c

Related Files

Ubuntu Security Notice USN-4693-1
Posted Jan 15, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4693-1 - It was discovered that an SQL injection vulnerability exists in the Ampache search engine. Any user able to perform searches could dump any data contained in the database. An attacker could use this to disclose sensitive information. It was discovered that an XSS vulnerability in Ampache. An attacker could use this vulnerability to force an admin to create a new privileged user. Various other issues were also addressed.

tags | advisory, sql injection
systems | linux, ubuntu
advisories | CVE-2019-12385, CVE-2019-12386
MD5 | 19e32413eae87248300241c7423c86b4
Ampache 3.8.6 Cross Site Scripting
Posted Jan 9, 2019
Authored by Zekvan Arslan | Site netsparker.com

Ampache version 3.8.6 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 69f79c87e008dff3be4d80a1277357c0
Ampache 3.8.2 Cross Site Scripting
Posted May 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Ampache version 3.8.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b6b93c3f9643a0cf897ff98afca7bb99
Ampache 3.5.4 Cross Site Scripting
Posted May 9, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Ampache version 3.5.4 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
MD5 | 17d6ad6c49246899a620963c9529f6fa
Secunia Security Advisory 44497
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Ampache, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 57e064c0f0deb90ea17ba12210250a47
Secunia Security Advisory 37867
Posted Dec 21, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Ampache, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 5ce79fa45e5827c9f04cb1634cb66734
Gentoo Linux Security Advisory 200812-22
Posted Dec 30, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200812-22 - An insecure temporary file usage has been reported in Ampache, allowing for symlink attacks. Dmitry E. Oboukhov reported an insecure temporary file usage within the gather-messages.sh script. Versions less than 3.4.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-3929
MD5 | 6fe9149cb6c50424e826a2b986308f87
Secunia Security Advisory 33316
Posted Dec 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for ampache. This fixes a security issue, which can be exploited by malicious local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | a7aaef2efaa6cf595d92573001feccb3
Secunia Security Advisory 27253
Posted Oct 15, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for ampache. This fixes some vulnerabilities, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct session fixation attacks.

tags | advisory, vulnerability, sql injection
systems | linux, gentoo
MD5 | cde331a39ff267cc2358549e0be812cb
Secunia Security Advisory 26542
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Ampache, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct session fixation attacks.

tags | advisory, vulnerability, sql injection
MD5 | 00b1473dedf0e742212a7ee9e7c529c9
Secunia Security Advisory 22842
Posted Nov 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ampache, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | a2170022ba23127696218835ce2ee59d
Secunia Security Advisory 17779
Posted Nov 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ampache, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 31970cfd1a9d9ea16d0cdec1bea84699
Secunia Security Advisory 15957
Posted Jul 9, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Bercegay has reported a vulnerability in Ampache, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 108be464052862f7692899f94e5a02af
nsat-1.5.tgz
Posted Jan 6, 2003
Authored by Mixter | Site 1337.tsx.org

Nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, nsat can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

Changes: New compilation option to support scanning with POSIX threads instead of fork to enhance performance, compilation / stability fixes, and updated timing values. Ping dependence is now disabled by default.
tags | tool, remote, scanner, vulnerability
systems | unix
MD5 | ba7f5bbc476bc937c16e3654a8e0a666
nslconf.c
Posted Sep 30, 2002
Authored by RaiSe | Site netsearch-ezine.com

Linuxconf v1.28r3 and below local exploit which uses the ptrace method to find the offset. Tested on Mandrake 8.0 and 8.2, and Redhat 7.2 and 7.3.

tags | exploit, local
systems | linux, redhat, mandrake
MD5 | d7351358fc20587891f1f8c16b558242
nsa1_1.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 80360dfc8c13cd1999a30c6402500820
nsa1_2.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 35c941112faadc3b741ea046d3d8fe99
nsa1_3.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 2b20dfa55c4a2d54d22c83dc2c243b23
nsa1_4.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 0a81f140ff86ca75fc850b9b6e424fde
nsahbook.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | a87168d9eae4f7615a23ffe90c8a6e91
nsa_1984.gif
Posted Aug 26, 2002

1984: The NSA is behind schedule.

tags | bbs
MD5 | 8216f4b54f567c5f418bf52e12a14f8c
nssilabs-keriosecvuln.txt
Posted Aug 21, 2002
Authored by Abraham Lincoln Hao | Site nssilabs.nssolution.com

NSSI Research Labs Security Advisory - Kerio Mail Server v5.x for Windows contains multiple denial of service and cross site scripting vulnerabilities in all mail services and the web mail module of the mail server.

tags | web, denial of service, vulnerability, xss
systems | windows
MD5 | 5a14427f3c783970843f37f0df069083
nssi.tpfw.txt
Posted Aug 21, 2002
Authored by Aaron Tan Lu | Site nssolution.com

NSSI Research Labs Security Advisory NSSI-2002-tpfw - The Tiny Personal Firewall 3.0 for Windows contains contains denial of service vulnerabilities in the activity logger tab of the Personal Firewall Agent module which allow remote attackers to crash the OS, consuming 100% of the CPU.

tags | remote, denial of service, vulnerability
systems | windows
MD5 | 0d047930124279f574a2c39f7d5a8568
nstalker-chunked.c
Posted Jun 29, 2002
Authored by Thiago Zaninotti | Site nstalker.com

Apache Chunked Transfer vulnerability scanner. Does not check the banner - crashes a thread and watches the web server behavior.

tags | tool, web, scanner
systems | unix
MD5 | 91b79acdbd9a0e019f42e41596d420a6
nsat-1.43.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: New IDS evasion for HTTP (some whisker types), a webscan-only config file, and some code cleanups.
tags | tool, remote, scanner, vulnerability
systems | unix
MD5 | 9613f5bcc1a9bc7afd4016caeacb3739
Page 1 of 4
Back1234Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close