what you don't know can hurt you
Showing 1 - 12 of 12 RSS Feed

Files Date: 2011-06-25

OpenSCAP Libraries 0.7.3
Posted Jun 25, 2011
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF.

Changes: This release adds new probes and schemas for OVAL 5.8 support, has RHEL6 SCAP content improvements, creates an "analyse" mode in the oscap tool, supports validation against schematron rules, and has many bugfixes.
tags | protocol, library
systems | unix
MD5 | ed0f0d9604a57bebf0c36534d595c9ab
Suricata IDPE 1.0.4
Posted Jun 25, 2011
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various issues found by different source code analyzers were fixed. Bundled LibHTP was updated to 0.2.6.
tags | tool, intrusion detection
systems | unix
MD5 | bb69eff00783e64c75a94e29a6400ef4
Siemens FactoryLink 8 CSService Logging Buffer Overflow
Posted Jun 25, 2011
Authored by Luigi Auriemma, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found on Siemens FactoryLink 8. The vulnerability occurs when CSService.exe processes a CSMSG_ListFiles_REQ message, the user-supplied path first gets converted to ANSI format (CodePage 0), and then gets handled by a logging routine where proper bounds checking is not done, therefore causing a stack-based buffer overflow, and results arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | a30ca1fa79b489233a81a1edd484d445
Lotus Notes 8.0.x - 8.5.2 FP2 - Autonomy Keyview
Posted Jun 25, 2011
Authored by alino | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Lotus Notes 8.5.2 when parsing a specially crafted malformed LZH file.

tags | exploit, overflow
advisories | CVE-2011-1213, OSVDB-72706
MD5 | 63780a7bbc2036fee712d28fb0b7f806
Post Exploitation Using Metasploit Pivot And Port Forward
Posted Jun 25, 2011
Authored by David J. Dodd

Whitepaper called Post Exploitation using Metasploit pivot and port forward. A very nice feature in Metasploit is the ability to pivot through a meterpreter session to the network on the other side. This tutorial walks you through how this is done once you have a meterpreter session on a foreign box.

tags | paper
MD5 | a62c893f7a0c9e486419d50f53dac697
eHub SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

eHub suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 5bc7e24a32cc400b63e49be6762b672e
Misronline SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

Misronline suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9eea62b96b6eb6ead8dec19642afc1dc
Quram Blind SQL Injection
Posted Jun 25, 2011
Authored by Kalashinkov3

Quram suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 35149d99f4e362fd044e623181aca72a
nodesforum SQL Injection
Posted Jun 25, 2011
Authored by Andrea Bocchetti

nodesforum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b7f1c247dd5c93048178724ce657cdf6
Easewe FTP 4.5.0.9 Insecure Method
Posted Jun 25, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

The Easewe FTP OCX ActiveX control suffers from an insecure method vulnerability.

tags | exploit, activex
MD5 | f943cdcbe8857b30e18b90451b98dc67
FreeAmp 2.0.7 PLS Buffer Overflow
Posted Jun 25, 2011
Authored by C4SS!0 G0M3S

FreeAmp version 2.0.7 local buffer overflow exploit that creates a malicious .pls file.

tags | exploit, overflow, local
MD5 | 8fbc1a57ef55558bd3645bb0082602c3
Tinc Virtual Private Network Daemon 1.0.15
Posted Jun 25, 2011
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release improves logging to files, reduces the amount of process wakeups on platforms that support pselect(), and fixes the ProcessPriority option on Windows, which was broken in 1.0.14.
tags | encryption
systems | unix
MD5 | 44bb7d1618955a0a56e9e159f1c46362
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    1 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close