what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-06-01

Tor-ramdisk i686 UClibc-based Linux Distribution x86 20150531
Posted Jun 1, 2015
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: Various updates.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 26a86c0bd80463e579796f61879dae0ea0b6b4039d59758af1a58643d38b3459
Maligno 2.2
Posted Jun 1, 2015
Authored by Juan J. Guelfo | Site encripto.no

Maligno is an open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is encrypted with AES and encoded with Base64 prior to transmission.

Changes: Get caught mode improvements, new adversary replication profile, bug fixes, and minor adjustments.
tags | tool, web, scanner, shellcode, python
systems | unix
SHA-256 | b2b1c7b1e4a5c6a71a131aa0a9589a106ac6431993dc3ad47f5082c3fd9a5ac8
D-Link Devices HNAP SOAPAction-Header Command Execution
Posted Jun 1, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
SHA-256 | fc44a93eba283e1584275d9596c2494164e66d54813e74e0886f302958943e2e
Red Hat Security Advisory 2015-1041-01
Posted Jun 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1041-01 - Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat JBoss Fuse 6.1.0 and Red Hat JBoss A-MQ 6.1.0. It includes several bug fixes, which are documented in the readme.txt file included with the patch files. The following security issues are addressed in this release: It was found that Apache Camel's XML converter performed XML External Entity expansion. A remote attacker able to submit an SAXSource containing an XXE declaration could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

tags | advisory, remote, xxe
systems | linux, redhat
advisories | CVE-2015-0263, CVE-2015-0264
SHA-256 | ca80b7b5b399e7d7f9d4b52fc1738483535cd392df8030a2096d79d0ce76f1a9
Ubuntu Security Notice USN-2624-1
Posted Jun 1, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2624-1 - As a security improvement, this update removes the export cipher suites from the default cipher list to prevent their use in possible downgrade attacks.

tags | advisory
systems | linux, ubuntu
SHA-256 | 8328f1487126fffcb5e26e11cf2e68e0cac14035a9c3421be07487106d453b8d
Ubuntu Security Notice USN-2623-1
Posted Jun 1, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2623-1 - It was discovered that racoon, the ipsec-tools IKE daemon, incorrectly handled certain UDP packets. A remote attacker could use this issue to cause racoon to crash, resulting in a denial of service.

tags | advisory, remote, denial of service, udp
systems | linux, ubuntu
advisories | CVE-2015-4047
SHA-256 | 7c3a3902464354d266c4315c3b191a0183bab513adc8856e0e6d8c2646ac76cd
Debian Security Advisory 3276-1
Posted Jun 1, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3276-1 - Jakub Zalas discovered that Symfony, a framework to create websites and web applications, was vulnerable to restriction bypass. It was affecting applications with ESI or SSI support enabled, that use the FragmentListener. A malicious user could call any controller via the /_fragment path by providing an invalid hash in the URL (or removing it), bypassing URL signing and security rules.

tags | advisory, web
systems | linux, debian
advisories | CVE-2015-4050
SHA-256 | 42e6a6804a0b595eed00494c42c75f80ce06b9b617a92a2229c0b7bad026d203
Debian Security Advisory 3269-2
Posted Jun 1, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3269-2 - The update for postgresql-9.1 in DSA-3269-1 introduced a regression which can causes PostgreSQL to refuse to restart after an unexpected shutdown or when restoring from a binary backup. Updated packages are now available to address this regression.

tags | advisory
systems | linux, debian
SHA-256 | 88dd628a7933080b370958111c02eab3cd98208ee86436c0e9ffa7e4cd774343
Debian Security Advisory 3275-1
Posted Jun 1, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3275-1 - Ansgar Burchardt discovered that the Git plugin for FusionForge, a web-based project-management and collaboration software, does not sufficiently validate user provided input as parameter to the method to create secondary Git repositories. A remote attacker can use this flaw to execute arbitrary code as root via a specially crafted URL.

tags | advisory, remote, web, arbitrary, root
systems | linux, debian
advisories | CVE-2015-0850
SHA-256 | c184c6b561b6fcd2eb432f1f2aae55189e31682b9df00a55e0e0d5e60ae381c2
Gentoo Linux Security Advisory 201505-03
Posted Jun 1, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201505-3 - Multiple vulnerabilities have been found in phpMyAdmin, the worst of which could lead to arbitrary code execution. Versions less than 4.2.13 are affected.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2014-4986, CVE-2014-4987, CVE-2014-6300, CVE-2014-8958, CVE-2014-8959, CVE-2014-8960, CVE-2014-8961
SHA-256 | b68fe150f671d88e3e451aee79af982757cc142d624ae403752b2b561357f0f7
Gentoo Linux Security Advisory 201505-02
Posted Jun 1, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201505-2 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 11.2.202.460 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079, CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091, CVE-2015-3092, CVE-2015-3093
SHA-256 | f663dc1cfad1b619dc5d05e5d0d9e4af9c891c5a188d77bfad0c62379107bdfb
SafeConfig 2015 Call For Papers
Posted Jun 1, 2015

SafeConfig 2015 has announced its Call For Papers. It will take place October 12, 2015 at the Denver Marriott City Center, Denver, Colorado, USA.

tags | paper, conference
SHA-256 | 5fa6736b1a9382b14d3550ade42927ff1082ddcd7a6b81a0ad43d5ba3ce1c704
IBM Security AppScan 9.0.2 Remote Code Execution
Posted Jun 1, 2015
Authored by Naser Farhadi

IBM Security AppScan versions 9.0.2 and below suffer from an OLE automation array remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | bdbb02b9c45e103fb031db03d3afe666c96f49b923bd92f0bb91da75ba3e0e4e
WordPress UserPro 2.33 Cross Site Scripting
Posted Jun 1, 2015
Authored by Faisal Ahmed

WordPress UserPro plugin version 2.33 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 00c7e1c5aab8cf7ed24d12abd7444f650a18fdb923d4feb349ffba2b5d6101aa
Yooz.ir Open Redirect
Posted Jun 1, 2015
Authored by Milad Hacking

Yooz.ir suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 1938b338a8c5497ac044dd74014ba1153a233eba4d43e82e746d34f5cdba5f6e
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close