exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 2014-06-20

ZeroCMS 1.0 SQL Injection
Posted Jun 20, 2014
Authored by Filippos Mastrogiannis

ZeroCMS version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2014-4194
SHA-256 | d4adc25ab654f27e19d62dd54d52cac4e301868fead6c76b8d36705d3ef376f2
Ubuntu Security Notice USN-2252-1
Posted Jun 20, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2252-1 - A bounds check error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. A remainder calculation error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-3144, CVE-2014-3145
SHA-256 | 0a89de935a50d06d0598ec1e19404e3c7fc51c91a4b62f5fe952a46d6118f724
Ubuntu Security Notice USN-2251-1
Posted Jun 20, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2251-1 - A bounds check error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. A remainder calculation error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-3144, CVE-2014-3145
SHA-256 | 176d5822ccb535de1f90d669ac5c981cbc29a5fa73a8a6a8af87d1ef1a524c6b
privacyIDEA 1.0
Posted Jun 20, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

Changes: Various updates.
tags | tool, encryption
systems | unix
SHA-256 | ce3b1b7ce265e3278f65a70bff53448c5d1500278ca24f6f8622451ac0f87615
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close