the original cloud security
Showing 1 - 12 of 12 RSS Feed

Files Date: 2011-06-25

OpenSCAP Libraries 0.7.3
Posted Jun 25, 2011
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF.

Changes: This release adds new probes and schemas for OVAL 5.8 support, has RHEL6 SCAP content improvements, creates an "analyse" mode in the oscap tool, supports validation against schematron rules, and has many bugfixes.
tags | protocol, library
systems | unix
MD5 | ed0f0d9604a57bebf0c36534d595c9ab
Suricata IDPE 1.0.4
Posted Jun 25, 2011
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various issues found by different source code analyzers were fixed. Bundled LibHTP was updated to 0.2.6.
tags | tool, intrusion detection
systems | unix
MD5 | bb69eff00783e64c75a94e29a6400ef4
Siemens FactoryLink 8 CSService Logging Buffer Overflow
Posted Jun 25, 2011
Authored by Luigi Auriemma, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found on Siemens FactoryLink 8. The vulnerability occurs when CSService.exe processes a CSMSG_ListFiles_REQ message, the user-supplied path first gets converted to ANSI format (CodePage 0), and then gets handled by a logging routine where proper bounds checking is not done, therefore causing a stack-based buffer overflow, and results arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | a30ca1fa79b489233a81a1edd484d445
Lotus Notes 8.0.x - 8.5.2 FP2 - Autonomy Keyview
Posted Jun 25, 2011
Authored by alino | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Lotus Notes 8.5.2 when parsing a specially crafted malformed LZH file.

tags | exploit, overflow
advisories | CVE-2011-1213, OSVDB-72706
MD5 | 63780a7bbc2036fee712d28fb0b7f806
Post Exploitation Using Metasploit Pivot And Port Forward
Posted Jun 25, 2011
Authored by David J. Dodd

Whitepaper called Post Exploitation using Metasploit pivot and port forward. A very nice feature in Metasploit is the ability to pivot through a meterpreter session to the network on the other side. This tutorial walks you through how this is done once you have a meterpreter session on a foreign box.

tags | paper
MD5 | a62c893f7a0c9e486419d50f53dac697
eHub SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

eHub suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 5bc7e24a32cc400b63e49be6762b672e
Misronline SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

Misronline suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9eea62b96b6eb6ead8dec19642afc1dc
Quram Blind SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

Quram suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 35149d99f4e362fd044e623181aca72a
nodesforum SQL Injection
Posted Jun 25, 2011
Authored by Andrea Bocchetti

nodesforum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b7f1c247dd5c93048178724ce657cdf6
Easewe FTP 4.5.0.9 Insecure Method
Posted Jun 25, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

The Easewe FTP OCX ActiveX control suffers from an insecure method vulnerability.

tags | exploit, activex
MD5 | f943cdcbe8857b30e18b90451b98dc67
FreeAmp 2.0.7 PLS Buffer Overflow
Posted Jun 25, 2011
Authored by C4SS!0 G0M3S

FreeAmp version 2.0.7 local buffer overflow exploit that creates a malicious .pls file.

tags | exploit, overflow, local
MD5 | 8fbc1a57ef55558bd3645bb0082602c3
Tinc Virtual Private Network Daemon 1.0.15
Posted Jun 25, 2011
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release improves logging to files, reduces the amount of process wakeups on platforms that support pselect(), and fixes the ProcessPriority option on Windows, which was broken in 1.0.14.
tags | encryption
systems | unix
MD5 | 44bb7d1618955a0a56e9e159f1c46362
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    6 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close