exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-05-23

Stegano 0.5.4
Posted May 23, 2016
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: The generator provided to the functions lsbset.hide() and lsbset.reveal() is now a function. This is more convenient for a user who wants to use a custom generator (not in the module lsbset.generators). Performance improvements for the lsb and lsbset modules.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | eea5f9ca57df57cc052374580555fb8f64ac6a081e2972a3a17ca79312b3b48d
Red Hat Security Advisory 2016-1096-01
Posted May 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1096-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality.

tags | advisory, remote, denial of service, kernel, udp
systems | linux, redhat
advisories | CVE-2015-5364, CVE-2015-5366
SHA-256 | d6f494c765f33232f531d11b2e6eda22f2c43ad3b026c0288860ab76b60b61d2
Debian Security Advisory 3585-1
Posted May 23, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3585-1 - Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in denial of service.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2016-4006, CVE-2016-4079, CVE-2016-4080, CVE-2016-4081, CVE-2016-4082, CVE-2016-4085
SHA-256 | f2bccfc2144f228057aeb26f3c58194c69ee3726c2b8880fbb06a565da8ef44f
JobScript Remote Code Execution
Posted May 23, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

JobScript suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin-ajax.php' script thru the 'name' and 'file' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php' extension (to bypass the '.htaccess' block rule) that will be stored in '/jobmonster/wp-content/uploads/jobmonster/' directory.

tags | exploit, arbitrary, php, code execution
SHA-256 | ebbd14e9080ce7820b95b2208012010a9a83d14e9f97841c699bfbe6706716ab
Operation Technology ETAP 14.1.0 Stack Buffer Overflow
Posted May 23, 2016
Authored by LiquidWorm | Site zeroscience.mk

Multiple ETAP binaries are prone to a stack-based buffer overflow vulnerability because the application fails to handle malformed arguments. Version 14.1.0.0 is affected. An attacker can exploit these issues to execute arbitrary code within the context of the application or to trigger a denial-of-service conditions.

tags | exploit, overflow, arbitrary
SHA-256 | 1099aacf1bea150f3f5b0d2b083815b5b9639cb8d176966b60c20e6f33f2bd28
Linknat VOS3000/VOS2009 SQL Injection
Posted May 23, 2016
Authored by Osama Khalid

Linknat VOS3000/VOS2009 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0ae3413cc36311b832cc800fbc0fe838b41fbbf707073fec1c0d8e500feaeac4
WEBONE CMS 6 SQL Injection
Posted May 23, 2016
Authored by indoushka

WEBONE CMS version 6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c586691bbe7c33c05e24864f607a414bcaba8a51ae9fa8aebc2051a54ea0e918
AMSS++ 4.2 Admin Backdoor Account
Posted May 23, 2016
Authored by indoushka

AMSS++ version 4.2 has an admin/admin backdoor account.

tags | exploit
SHA-256 | 3d053d75fc4e79afef02a50a644a8e6cf4a9f111809a067ec8973b5ddf2e0fbf
Lws-Construction Management 1.0 SQL Injection
Posted May 23, 2016
Authored by indoushka

Lws-Construction Management version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c36d0e7573f5f4c6286e5bac90efe9861de5a2a98a92164fd1b110577fac9378
JobScript Open Redirection
Posted May 23, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

JobScript suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | e346964b5931d627f76776af0fec044f2c71e336366251548304f0d59283e2f0
Calliope 2.31 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Calliope version 2.31 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 85b10f367e99494fdc1e2fff03f4010816dfafd1b727faab0b01577307e01da3
Annuaire de Salon et Foire 1.4 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Annuaire de Salon et Foire version 1.4 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 211270e8c5b25f157973aa76d5f87ef7631f0e04c60010dcfacb6b9acb263ebf
Sitizy 2.0 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Sitizy version 2.0 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 368b7c6cc8b2c621763042755f7a7af6bfa6b288022f19453090568d7e7c23dc
Sunxi Linux Module Backdoor
Posted May 23, 2016
Authored by Analiz

This is a Linux kernel module that adds a backdoor to a system. Based on sunxi_debug.

tags | tool, kernel, rootkit
systems | linux, unix
SHA-256 | 4e6f48c2c881d53eaa6936060c88426fcbc23abe2ac8482887470073b2fa311f
Torop Tourisme 2.0 SQL Injection
Posted May 23, 2016
Authored by indoushka

Torop Tourisme version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f993e7d991635981f6e04e07467d842f33ccd0f70d0bae57982817e3e54a7135
Linux x86_64 Information Stealer Shellcode
Posted May 23, 2016
Authored by Roziul Hasan Khan Shifat

Linux x86_64 information stealing shellcode.

tags | shellcode
systems | linux
SHA-256 | 84065b4963be2b5e6670a61dd5781c3db6b6e7157e683d2ee928c6dac799ff6d
pyJoiner Tool Using Tkinter
Posted May 23, 2016
Authored by W1ckerMan, Daniel Moreno

This is a deviation of the pyJoiner tool using Tkinter.

tags | tool
systems | unix
SHA-256 | cbc3f942a985eb959fc6777f7b95175d48e25a1768f27aa2d6428478ed9705db
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close