exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2014-09-23

I2P 0.9.15
Posted Sep 23, 2014
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates.
tags | tool
systems | unix
MD5 | bfe6862f205d057e4f0c8c6c3558c552
Suricata IDPE 2.0.4
Posted Sep 23, 2014
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | 90eb4368480c46917c145ff2cb0b6b64
Lynis Auditing Tool 1.6.2
Posted Sep 23, 2014
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Detection for SaltStack configuration management tooling. ShowSymlinkPath function to check path behind a symlink. IsVirtualMachine function to check if system is running in VM. FileIsEmpty function to check for empty files. Various other changes and improvements.
tags | tool, scanner
systems | unix
MD5 | 3c40f2eb2db7be1406695e27f43a5ce2
Secure rm 1.2.14
Posted Sep 23, 2014
Authored by Matthew Gauthier | Site srm.sourceforge.net

Secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: Various updates.
tags | tool
systems | unix
MD5 | dc86ea4b36eb4663eb6486d38388f908
IPSet Bash Completion 2.6
Posted Sep 23, 2014
Authored by AllKind | Site sourceforge.net

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.

Changes: This release adds support for the new "skbinfo" options and the new set type "hash:mac" of ipset 6.22.
tags | tool, shell, firewall, bash
systems | linux, unix
MD5 | 47fbf7f56f87d70c31a08f070842de4b
X2Engine 4.1.7 Unrestricted File Upload
Posted Sep 23, 2014
Authored by EgiX

X2Engine versions 4.1.7 and below suffer from an unrestricted file upload vulnerability due to poor use of a blacklist.

tags | exploit, file upload
advisories | CVE-2014-5298
MD5 | 146f05b73cebbdf28b5a12d4a6a158f2
X2Engine 4.1.7 PHP Object Injection
Posted Sep 23, 2014
Authored by EgiX

X2Engine versions 2.8 through 4.1.7 suffer from a PHP object injection vulnerability.

tags | exploit, php
advisories | CVE-2014-5297
MD5 | bd183eb48e521793677e5f35070a473a
Get Simple CMS 3.3.3 CSRF / XSS / Clickjacking
Posted Sep 23, 2014
Authored by Vadodil Joel Varghese

Get Simple CMS version 3.3.3 suffers from cross site request forgery, clickjacking, and various cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | ec7f3014fafdfa83d0a1cc71a8311461
Technical Information On Vulnerabilities Of Hypercall Handlers
Posted Sep 23, 2014
Authored by Samuel Kounev, Bryan D. Payne, Aleksandar Milenkoski, Nuno Antunes, Marco Vieira | Site research.spec.org

Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerability of a hypercall handler may have severe consequences such as altering hypervisor's memory, which may result in the execution of malicious code with hypervisor privilege. Despite the importance of vulnerabilities of hypercall handlers, there is not much publicly available information on them. This significantly hinders advances towards securing hypercall interfaces. In this work, the researchers provide in-depth technical information on publicly disclosed vulnerabilities of hypercall handlers. Our vulnerability analysis is based on reverse engineering the released patches fixing the considered vulnerabilities. For each analyzed vulnerability, they provide background information essential for understanding the vulnerability, and information on the vulnerable hypercall handler and the error causing the vulnerability. The researchers also show how the vulnerability can be triggered and discuss the state of the targeted hypervisor after the vulnerability has been triggered.

tags | paper, kernel, vulnerability
advisories | CVE-2012-3494, CVE-2012-3495, CVE-2012-3496, CVE-2012-4539, CVE-2012-5510, CVE-2012-5513, CVE-2012-5525, CVE-2013-1964
MD5 | 92ae0275ee746395a05d511bc9bc6f63
xcode-select 13.4.0 Buffer Overflow
Posted Sep 23, 2014
Authored by Juan Sacco

xcode-select on Darwin kernel version 13.4.0 suffers from a buffer overflow vulnerability.

tags | exploit, overflow, kernel
MD5 | ec9e47863c36dd7a9abbee6165787eef
Page 1 of 1

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By