Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-12-20

FireHOL 3.0.0
Posted Dec 20, 2015
Authored by Costa Tsaousis | Site firehol.org

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Bidirectional fixes. Now accepts parameters case insensitive. Various other improvements.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | 0f4bed6175e71065ee74bd140436f09e
GNU Privacy Guard 1.4.20
Posted Dec 20, 2015
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Minor updates.
tags | tool, encryption
MD5 | b7af897a041c03c8ad1c7c466b54d10d
Gentoo Linux Security Advisory 201512-03
Posted Dec 20, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201512-3 - GRUB's authentication prompt can be bypassed by entering a sequence of backspace characters. Versions less than 2.02_beta2-r8 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2015-8370
MD5 | 43576b322118f4c3072103d53e3559cf
Debian Security Advisory 3428-1
Posted Dec 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3428-1 - It was discovered that malicious web applications could use the Expression Language to bypass protections of a Security Manager as expressions were evaluated within a privileged code section.

tags | advisory, web
systems | linux, debian
advisories | CVE-2014-7810
MD5 | 59447ae2df6adbd5ce57c41f26799b60
Ubuntu Security Notice USN-2854-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2854-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | 6864faca020a0abd57e1eab91034b50b
Ubuntu Security Notice USN-2853-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2853-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | 65fc601ec2d53830868ca6ac4d1afac8
Ubuntu Security Notice USN-2852-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2852-1 - Jann Horn discovered a ptrace issue with user namespaces in the Linux kernel. The namespace owner could potentially exploit this flaw by ptracing a root owned process entering the user namespace to elevate its privileges and potentially gain access outside of the namespace.

tags | advisory, kernel, root
systems | linux, ubuntu
MD5 | c1d7d963e092fe7b3f341407f7d7310a
Ubuntu Security Notice USN-2851-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2851-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | 362db96cf060e832681146426555aa9a
Ubuntu Security Notice USN-2849-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2849-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | a88b3bd1d73aae8f74ef1bb8711cb924
Ubuntu Security Notice USN-2850-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2850-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | 32ef575e8490dc16a0b8b3138ba85e53
Ubuntu Security Notice USN-2848-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2848-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | 009d7ae789fdd7b9b5645f25c1fe3934
Ubuntu Security Notice USN-2847-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2847-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | a9d82c32b80de0c85f850352b550e6d3
Ubuntu Security Notice USN-2846-1
Posted Dec 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2846-1 - Felix Wilhelm discovered a race condition in the Xen paravirtualized drivers which can cause double fetch vulnerabilities. An attacker in the paravirtualized guest could exploit this flaw to cause a denial of service (crash the host) or potentially execute arbitrary code on the host. Konrad Rzeszutek Wilk discovered the Xen PCI backend driver does not perform sanity checks on the device's state. An attacker could exploit this flaw to cause a denial of service (NULL dereference) on the host. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-8550, CVE-2015-8551, CVE-2015-8552
MD5 | d249867efd8a7287b0d7ab78a81b16ab
Exam Board 3.0.0 Blind SQL Injection
Posted Dec 20, 2015
Authored by indoushka

Exam Board version 3.0.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | db2b517114faf616d148882bb483f7fc
WordPress WooCommerce 2.4.12 PHP Code Injection
Posted Dec 20, 2015
Authored by indoushka

WordPress WooCommerce plugin version 2.4.12 suffers from a php code injection vulnerability.

tags | exploit, php
MD5 | 55bea0fc8127e09de60d12b29b76428b
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close