what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2015-09-09

Evading All Web-Application Firewalls XSS Filters
Posted Sep 9, 2015
Authored by Mazin Ahmed

This whitepaper documents shortcomings in various popular web application firewalls (WAFS) and how to trigger cross site scripting attacks regardless of the protections in place. Covered are F5 Big IP, Imperva Incapsula, AQTRONIX WebKnight, PHP-IDS, Mod-Security, Sucuri, QuickDefense, and Barracuda WAF.

tags | paper, web, xss
SHA-256 | c38f62eb042bf845f286dc56c557e0a4422de464a3d9658b8fd2d013a1a708c2
GNU Privacy Guard 2.0.29
Posted Sep 9, 2015
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes.
tags | tool, encryption
SHA-256 | 68ed6b386ba78425b05a60e8ee22785ff0fef190bdc6f1c612f19a58819d4ac9
RSA Identity Management And Governance Cross Site Scripting
Posted Sep 9, 2015
Site emc.com

RSA Identity Management and Governance contains fixes for cross site scripting vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. All versions are RSA IMG are affected by CVE-2015-4539. Versions prior to 6.9.1 P6 and 6.8.1 P18 are affected by CVE-2015-4540.

tags | advisory, vulnerability, xss
advisories | CVE-2015-4539, CVE-2015-4540
SHA-256 | e959e55976a5e496a92a7eff60c3c1ef4c1ef7300a1ecca9ac7aadbae5851084
Ubuntu Security Notice USN-2738-1
Posted Sep 9, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2738-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
SHA-256 | a930e4570ab20c53e70b727a93dd7fc250e1e1c0a5a1d3d6c835b09cbb64ef42
Ubuntu Security Notice USN-2737-1
Posted Sep 9, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2737-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
SHA-256 | 2c28d01d683933b1074e5a7999689400ed326d3219d1b6100a0ba98626b9669d
HP Security Bulletin HPSBOV03506 1
Posted Sep 9, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBOV03506 1 - A potential security vulnerability has been identified with TCP/IP Services for OpenVMS running BIND. The vulnerability could be remotely exploited to cause a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, tcp
advisories | CVE-2015-5477
SHA-256 | 697a636a6d3aecc307d2f528b38ae8b2c5eb11f5f8497127186beae05657ab43
Debian Security Advisory 3354-1
Posted Sep 9, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3354-1 - Frediano Ziglio of Red Hat discovered a race condition flaw in spice's worker_update_monitors_config() function, leading to a heap-based memory corruption. A malicious user in a guest can take advantage of this flaw to cause a denial of service (QEMU process crash) or, potentially execute arbitrary code on the host with the privileges of the hosting QEMU process.

tags | advisory, denial of service, arbitrary
systems | linux, redhat, debian
advisories | CVE-2015-3247
SHA-256 | caab0b2f4da7f8568fd006270bd9ea0fc01b713fc7834cb9e91257c591db3739
Linux/x86 /bin/cat /etc/passwd Shellcode
Posted Sep 9, 2015
Authored by Ajith KP

75 bytes small Linux/x86 execve("/bin/cat", ["/bin/cat", "/etc/passwd"], NULL) shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 4aa30e89272e73130897778817a9290a8072019bacbd12fcbfd2381ff9a1d45b
Zed Attack Proxy 2.4.2 Windows Installer
Posted Sep 9, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.

Changes: Various updates.
tags | tool, web, vulnerability
systems | windows
SHA-256 | aa324e789a7f9b0cddf53ed241f9d964507965bd45adcf6a5159123718a138d2
Zed Attack Proxy 2.4.2 Mac OS X Release
Posted Sep 9, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

Changes: Various updates.
tags | tool, web, vulnerability
systems | apple, osx
SHA-256 | b6d8f3a9632ab99bae4097084df74efd2321c22182aff3a119dd1e69ecc69a63
Bro Network Security Monitor 2.4.1
Posted Sep 9, 2015
Authored by Robin Sommer, Vern Paxson | Site bro.org

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: Moved SIP analyzer to flowunit instead of datagram. Fixed potential ARP out-of-bounds memory access. Various other updates and fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | d8b99673a5024630f6bae820c4f8c3ca9029f1167f9e5729c914c66e1fc7c8f6
Zed Attack Proxy 2.4.2 Linux Release
Posted Sep 9, 2015
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.

Changes: Various updates.
tags | tool, web, vulnerability
systems | linux, unix
SHA-256 | b5eb66232d133c58a780ad5b2044ce17c8987ba87aceed63cc492aa1f1620dd7
Mobius Forensic Toolkit 0.5.22
Posted Sep 9, 2015
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: Updates to emule-agent. Various bug fixes and improvements.
tags | tool, python, forensics
SHA-256 | ae57c8a21c2d227c1da015994adc64253f0e248b89f387015b92bfbd5c8afc05
Qlikview 11.20 SR4 Blind XXE Injection
Posted Sep 9, 2015
Authored by Alex Haynes

The Qlikview platform is vulnerable to XML External Entity (XXE) vulnerabilities. More specifically, the platform is susceptible to DTD parameter injections, which are also "blind" as the server feeds back no visual response. These vulnerabilities can be exploited to force Server Side Request Forgeries (SSRF)in multiple protocols, as well as reading and extracting arbitrary files on the server directly. Version 11.20 SR4 is vulnerable.

tags | exploit, arbitrary, vulnerability, protocol, xxe
advisories | CVE-2015-3623
SHA-256 | a5ff2a5356848862e8dae59e2e7566e7cec347863f2849477e43814c9500de31
Autoexchanger 5.1.0 Cross Site Request Forgery
Posted Sep 9, 2015
Authored by Aryan Bayaninejad

Autoexchanger version 5.1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-6827
SHA-256 | eae47dcd23bed6bb9002f1b6fd5dec820fbf7300e7e4d7160308d169fee161be
Windows win32k!NtUserSetInformationThread Type Confusion
Posted Sep 9, 2015
Authored by Google Security Research, matttait

The Windows Kernel is subject to a kernel-mode type-confusion vulnerability inside win32k!NtUserSetInformationThread due to referencing a user-mode handle via ObReferenceObjectByHandle with a "NULL" type specified (it should instead be using *LpcPortObjectType to protect against this vulnerability). This vulnerability can be triggered from inside CSRSS via the syscall win32k!NtUserSetInformationThread with ThreadInformationClass set to "UserThreadCsrApiPort" and the parameter of the syscall set to a HANDLE that is not an LPC object.

tags | advisory, kernel
systems | linux, windows
SHA-256 | f08ca467d2241babc70e51da65057abb65b9ecf85249b35405cfc513910c45d6
DirectAdmin 1.483 Cross Site Request Forgery / Cross Site Scripting
Posted Sep 9, 2015
Authored by Ashiyane Digital Security Team, Ehsan Hosseini

DirectAdmin web control panel version 1.483 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss, csrf
SHA-256 | bb8b0abf6ab6880c873e46a45a1b98526ad3e04189950fc9b7cc901bfa9b7367
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close