Exploit the possiblities
Showing 1 - 21 of 21 RSS Feed

Files Date: 2015-04-15

Zed Attack Proxy 2.4.0 Windows Installer
Posted Apr 15, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.

Changes: A new attack mode has been added. A completely new fuzzing dialog has been introduced that allows multiple injection points to be attacked at the same time. Various other updates and additions.
tags | tool, web, vulnerability
systems | windows
MD5 | d0a2e5c6f1cc142b1c8f3000373432af
Zed Attack Proxy 2.4.0 Linux Release
Posted Apr 15, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.

Changes: A new attack mode has been added. A completely new fuzzing dialog has been introduced that allows multiple injection points to be attacked at the same time. Various other updates and additions.
tags | tool, web, vulnerability
systems | linux, unix
MD5 | 092a48f7e0442727db8b880381ff6886
Zed Attack Proxy 2.4.0 Mac OS X Release
Posted Apr 15, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

Changes: A new attack mode has been added. A completely new fuzzing dialog has been introduced that allows multiple injection points to be attacked at the same time. Various other updates and additions.
tags | tool, web, vulnerability
systems | apple, osx
MD5 | f191e935c8dca0747c51d0a6920327a9
I2P 0.9.19
Posted Apr 15, 2015
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | a6eb92a988af316aa41329554b1a6810
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20150411
Posted Apr 15, 2015
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: tor updated to 0.2.6.7. kernel updated to 3.19.3 + Gentoo's hardened-patches-3.19.3-2.extras.
tags | tool, kernel, peer2peer
systems | linux
MD5 | 9493dc1b9c0fe859b34400a5ca39f501
WordPress MiwoFTP 1.0.5 CSRF Command Execution
Posted Apr 15, 2015
Authored by LiquidWorm | Site zeroscience.mk

WordPress MiwoFTP plugin version 1.0.5 cross site request forgery arbitrary file creation exploit.

tags | exploit, arbitrary, csrf
MD5 | f945704162ca68fe8c71477b854ac1c1
WordPress MiwoFTP 1.0.5 CSRF / Cross Site Scripting
Posted Apr 15, 2015
Authored by LiquidWorm | Site zeroscience.mk

WordPress MiwoFTP plugin version 1.0.5 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | fa48af734ca9b4e2c6c14a918a68c2d6
WordPress MiwoFTP 1.0.5 Cross Site Request Forgery
Posted Apr 15, 2015
Authored by LiquidWorm | Site zeroscience.mk

WordPress MiwoFTP plugin version 1.0.5 cross site request forgery arbitrary file deletion exploit.

tags | exploit, arbitrary, csrf
MD5 | 8d9d38255b127905a1567ee4bd1ee0c8
Hancom Office Hwp 2014 Integer Overflow
Posted Apr 15, 2015
Authored by Daniel Regalado, Dan Caselden

Hancom is an office suite developer in South Korea. The HanWord processor (also called Hangul a.k.a HWP) is vulnerable to an integer overflow when assigning a long paragraph size value.

tags | advisory, overflow
advisories | CVE-2015-2810
MD5 | 1fbba5e1919e96e18ef289ab65dff1db
Microsoft Security Bulletin Summary For April, 2015
Posted Apr 15, 2015
Site microsoft.com

This bulletin summary lists eleven Microsoft security bulletins for April, 2015.

tags | advisory
MD5 | 987f496cf7b9757316cb7d6a914e49d4
Identifier-Based XSSI Attacks
Posted Apr 15, 2015
Authored by Takeshi Terada

This whitepaper focuses on a method of stealing data as a client side script's identifier (variable or function name). The author describes these attack techniques / browser vulnerabilities and then discuss countermeasures for these issues.

tags | paper, vulnerability
advisories | CVE-2014-6345, CVE-2014-7939
MD5 | e98d3ff3c3c341cc27282806d140312b
Abrt / Apport Race Condition / Symlink
Posted Apr 15, 2015
Authored by Tavis Ormandy

Various security issues relating to symlink attacks and race conditions with Abrt and Apport are documented here.

tags | exploit
advisories | CVE-2015-1318, CVE-2015-1862
MD5 | 3829ffa191e0aa652c40db3353126606
Panda Gold Protection 2015 15.1.0 Authentication Bypass
Posted Apr 15, 2015
Authored by Matthias Deeg

Panda Gold Protection 2015 version 15.1.0 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | b59a55bdc67c834fbc02a5ffe6a401ba
Panda Global Protection 2015 15.1.0 Authentication Bypass
Posted Apr 15, 2015
Authored by Matthias Deeg

Panda Global Protection 2015 version 15.1.0 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | b080cc4b287dfcafa49104dd75e04b1a
Panda Antivirus Pro 2015 15.1.0 Authentication Bypass
Posted Apr 15, 2015
Authored by Matthias Deeg

Panda Antivirus Pro 2015 version 15.1.0 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | ff02666d7aa119b771a402f4046be453
Panda Internet Security 2015 15.0.1 Authentication Bypass
Posted Apr 15, 2015
Authored by Matthias Deeg

Panda Internet Security 2015 version 15.0.1 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | 44c5e01ae90903bcc80371361351834b
Linux Apport/Abrt Local Root Exploit
Posted Apr 15, 2015
Authored by Tavis Ormandy

Linux Apport/Abrt local root exploit.

tags | exploit, local, root
systems | linux
advisories | CVE-2015-1318, CVE-2015-1862
MD5 | 6e662552e11de350de31dc8040aed5fc
Fedora abrt Race Condition
Posted Apr 15, 2015
Authored by Tavis Ormandy

Fedora abrt race condition exploit. It should be noted that it can take a few minutes to win the race condition.

tags | exploit
systems | linux, fedora
advisories | CVE-2015-1862
MD5 | ddc819cc96b3d3b943f4731b28cabe60
Samsung iPOLiS 1.12.2 ReadConfigValue Remote Code Execution
Posted Apr 15, 2015
Authored by Praveen Darshanam

Samsung iPOLiS version 1.12.2 ReadConfigValue heap spray remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2015-0555
MD5 | d1745be0d8ab3b5a910fe857592dd07f
Microsoft Security Bulletin Revision Increment For April, 2015
Posted Apr 15, 2015
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment for April, 2015.

tags | advisory
MD5 | 7b5e16568f866e3fec936dab486b4c91
log2space 6.2 Cross Site Scripting
Posted Apr 15, 2015
Authored by Provensec

log2space version 6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 833e3561a71cbbd192f57b7c070d228c
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close