accept no compromises
Showing 1 - 23 of 23 RSS Feed

Files Date: 2015-11-04

Nmap Port Scanner 6.49BETA6
Posted Nov 4, 2015
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Integrated all IPv6 OS fingerprint submissions from April to October. Integrated all IPv4 OS fingerprint submissions from February to October. Added 10 NSE scripts from 5 authors. Various other additions and updates.
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
MD5 | a2fed966041870dec4a493236ecf3942
pyClamd 0.3.16
Posted Nov 4, 2015
Authored by Alexandre Norman | Site xael.org

pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Changes: This version is compatible with python 3 (tested with 3.4.3) and python 2 (tested 2.7.3). The API for this new version is now object oriented. Useful classes are ClamdNetworkSocket and ClamdUnixSocket.
tags | tool, virus, python
systems | unix
MD5 | 8106b0f5c7cf4f8c5f37456772b32fed
Piwik 2.14.3 PHP Object Injection
Posted Nov 4, 2015
Authored by EgiX

Piwik versions 2.14.3 and below suffer from a PHP object injection vulnerability that can lead to remote code execution.

tags | exploit, remote, php, code execution
advisories | CVE-2015-7816
MD5 | 7c5bbac17aa1381c3f80fba1d07afc93
Piwik 2.14.3 Local File Inclusion
Posted Nov 4, 2015
Authored by EgiX

Piwik version 2.14.3 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2015-7815
MD5 | fe2bdc1b138804dcc2295fdf128146e8
ATutor 2.2 PHP Code Injection
Posted Nov 4, 2015
Authored by EgiX

ATutor versions 2.2 and below suffer from a remote php code injection vulnerability.

tags | exploit, remote, php
advisories | CVE-2015-7712
MD5 | ea74761d9613a5aaa681169d6022a427
ATutor 2.2 Cross Site Scripting
Posted Nov 4, 2015
Authored by EgiX

ATutor versions 2.2 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-7711
MD5 | 7a796af56f53c00102bcd30e7e37145a
ATutor 2.2 Session Variable Overloading
Posted Nov 4, 2015
Authored by EgiX

ATutor versions 2.2 and below suffer from a session variable overloading vulnerability.

tags | advisory
advisories | CVE-2014-9753
MD5 | 74806f78aee2c484d9ec08f4e2360333
ATutor 2.2 File Upload
Posted Nov 4, 2015
Authored by EgiX

ATutor versions 2.2 and below suffer from a remote unrestricted file upload vulnerability.

tags | exploit, remote, file upload
advisories | CVE-2014-9752
MD5 | 07499b6750c1e85829c0817d87da1937
Debian Security Advisory 3392-1
Posted Nov 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3392-1 - Pengsu Cheng discovered that FreeImage, a library for graphic image formats, contained multiple integer underflows that could lead to a supplying a specially crafted image.

tags | advisory
systems | linux, debian
advisories | CVE-2015-0852
MD5 | cfddfb3849713a1e1a280793b4511dcc
Red Hat Security Advisory 2015-1979-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1979-01 - Libreswan is an implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network. A flaw was discovered in the way Libreswan's IKE daemon processed IKE KE payloads. A remote attacker could send specially crafted IKE payload with a KE payload of g^x=0 that, when processed, would lead to a denial of service.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2015-3240
MD5 | 7369adb3ea6f2ebefd4bf7ed81d1dda5
HP Security Bulletin HPSBGN03429 2
Posted Nov 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03429 2 - A potential security vulnerability has been identified with HP ArcSight Logger. The vulnerability could be exploited remotely to disclose information. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2015-6029
MD5 | 60bc9d63f098a3b3b9f3a80f95853375
HP Security Bulletin HPSBGN03425 1
Posted Nov 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03425 1 - Potential security vulnerabilities have been identified with HP ArcSight SmartConnectors. The vulnerabilities could be exploited remotely to allow disclosure of information, and locally to allow escalation of privilege. Revision 1 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2015-2902, CVE-2015-2903
MD5 | 1b321af6345203b774c25cd00456afa9
HP Security Bulletin HPSBGN03430 1
Posted Nov 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03430 1 - A potential security vulnerability has been identified with ArcSight Management Center ArcSight Connector Appliance ArcSight Logger and ArcSight SmartConnectors. The vulnerability could be exploited locally to allow elevation of privilege. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-6030
MD5 | e5ac8675ce5d802c5bb47b06b112927f
Debian Security Advisory 3391-1
Posted Nov 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3391-1 - It was discovered that the web-based administration interface in the Horde Application Framework did not guard against Cross-Site Request Forgery (CSRF) attacks. As a result, other, malicious web pages could cause Horde applications to perform actions as the Horde user.

tags | advisory, web, csrf
systems | linux, debian
MD5 | 40b3c309b2671ca68c2a4d99d0e928b9
HP Security Bulletin HPSBGN03386 2
Posted Nov 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03386 2 - A potential security vulnerability has been identified with HP Central View Fraud Risk Management, Revenue Leakage Control, Dealer Performance Audit, Credit Risk Control, Roaming Fraud Control, and Subscription Fraud Prevention. The vulnerabilities could be exploited remotely and locally to allow disclosure of information. Revision 2 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2015-5406, CVE-2015-5407, CVE-2015-5408
MD5 | 8034ab3e4eec4c39f55ac2c85b431575
Red Hat Security Advisory 2015-1981-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1981-01 - Network Security Services is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-7181, CVE-2015-7182, CVE-2015-7183
MD5 | 2991f542ac1410f12d289bf392c60f81
Red Hat Security Advisory 2015-1980-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1980-01 - Network Security Services is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-7181, CVE-2015-7182, CVE-2015-7183
MD5 | 8a4a09d0513220a06400514383224877
Red Hat Security Advisory 2015-1982-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1982-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A same-origin policy bypass flaw was found in the way Firefox handled certain cross-origin resource sharing requests. A web page containing malicious content could cause Firefox to disclose sensitive information.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-4513, CVE-2015-7188, CVE-2015-7189, CVE-2015-7193, CVE-2015-7194, CVE-2015-7196, CVE-2015-7197, CVE-2015-7198
MD5 | efd5d34df538e36d667256696c2f78eb
FreeType 2.6.1 TrueType Parsing Heap-Based Out Of Bounds Read
Posted Nov 4, 2015
Authored by Google Security Research, mjurczyk

Heap-based out-of-bounds memory reads have been encountered in FreeType in the handling of the cmap (format 14) SFNT table.

tags | exploit
systems | linux
MD5 | 6679e16fccb9723cba31e4b0673b6088
Ubuntu Security Notice USN-2789-1
Posted Nov 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2789-1 - It was discovered that XScreenSaver incorrectly handled unplugging an external monitor. An attacker with physical access could use this flaw to gain access to a locked session.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-8025
MD5 | 9965d8100a130ae471749cda4a95e60e
Red Hat Security Advisory 2015-1978-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1978-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks. A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system. A buffer overflow flaw was found in the way the Linux kernel's virtio-net subsystem handled certain fraglists when the GRO functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-8559, CVE-2015-5156
MD5 | 169550741574787b8ae36f0688fdbc29
Red Hat Security Advisory 2015-1976-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1976-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks. A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
advisories | CVE-2014-8559
MD5 | ec1da2cffcc89bc65a97992c45b48225
Red Hat Security Advisory 2015-1977-01
Posted Nov 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1977-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks. A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system. A buffer overflow flaw was found in the way the Linux kernel's virtio-net subsystem handled certain fraglists when the GRO functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-8559, CVE-2015-5156
MD5 | c87848890e8c97c32aec3bfafb130473
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close