what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2015-12-15

Tor-ramdisk i686 UClibc-based Linux Distribution x86 20151215
Posted Dec 15, 2015
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: This release of tor-ramdisk switches from the tor-0.2.6 branch to the 0.2.7. This new branch depends on openssl’s elliptic curves code which is patented and can’t be distribute in tor-ramdisk. Luckily Gentoo has been working on porting over libressl as a drop in alternative to openssl.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 44d5890ff37dac7f469fbfe34c853afbb64a5853314c4f73d6c957f4c9b71441
Tequila File Hosting 1.5 Shell Upload
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | bfe8d1234300173f96675a71d46e4d5397e04506a211d7477770490d4aa61dd1
Tequila File Hosting 1.5 Cross Site Scripting
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 88e438d97852499ec115d2dd484e0d131f79b94ba3cc81ab4f0aa745638ac9be
Tequila File Hosting 1.5 Arbitrary File Download
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | 94517623094566de5d1f9e9678eec971d63fcb6f124f128a12bd6df3728db8ad
PHPBack 1.1 Cross Site Scripting
Posted Dec 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

PHPBack version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cde593d1a57a48476453da138a2d1b632caff1e0b22e7d834c48c72ed75ed6c6
Red Hat Security Advisory 2015-2623-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2623-01 - The grub2 packages provide version 2 of the Grand Unified Bootloader, a highly configurable and customizable bootloader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2015-8370
SHA-256 | 8e513ad962a5579515fa94feef5b7b79b914a236728e2e466f4e3b28975c6563
Red Hat Security Advisory 2015-2622-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2622-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. The following security issue is addressed with this release: Satellite failed to properly enforce permissions on the show and destroy actions for reports. This could lead to an authenticated user with show and/or destroy report permissions being able to view and/or delete any reports held in Foreman.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5233
SHA-256 | 37726f4d7c569bc6b0535d1aa94f36f3860f443afea2a1ff3a9861996b0c4fbd
Ovidentia absences 2.64 Remote File Inclusion
Posted Dec 15, 2015
Authored by bd0rk

Ovidentia absences module version 2.64 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 3e97faf501f844d82f7e0f6e87e39a859ffefa40b3bee3552719f6f66341eadf
XRace Pro 1.0 SQL Injection
Posted Dec 15, 2015
Authored by indoushka

XRace Pro version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 1bc61a68b8d50c7561bfe95b08df9f72227897056a7e482e12a6e5e00a073385
Article Script 1.00 SQL Injection
Posted Dec 15, 2015
Authored by Linux Zone Research Team

Article Script version 1.00 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bf3bd34d21288950a7c224d3847770fa34fb396d9b671f982696bf25900cad0f
Ovidentia bulletindoc 2.9 Remote File Inclusion
Posted Dec 15, 2015
Authored by bd0rk

Ovidentia bulletindoc module version 2.9 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | a357e47a4cee21ba42b8dbdeabf267672c3475de3646cc944d8cbf3a3144a77f
MyBB 1.8.2 Code Execution
Posted Dec 15, 2015
Authored by Saeid Bostandoust

MyBB versions 1.8.2 and below reverse shell remote code execution exploit.

tags | exploit, remote, shell, code execution
SHA-256 | c7b673efcf8b3123fbfd25dffb1c266d5f7e31d87791c64b0ba51ffb88102c2b
Grub2 Authentication Bypass
Posted Dec 15, 2015
Authored by Hector Marco, Ismael Ripoll

Grub2 versions 1.98 through 2.02 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2015-8370
SHA-256 | 83bd7487636061aa2b0800d6365ebfbe91d7c0307ab06febcf641741b08068f4
WordPress Tierra Billboard Manager 1.14 SQL Injection
Posted Dec 15, 2015
Authored by Linux Zone Research Team

WordPress Tierra Billboard Manager plugin version 1.14 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d053f4c97a5d5fe4d4beb0d4590b24c61c2431802fe56a0f82a76334a609db44
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close