exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-10-21

Nmap Port Scanner 7.30
Posted Oct 21, 2016
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: New service probe and match line for iperf3. Added Drupal to the set of web apps brute forced by http-form-brute. Various other updates and fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | d83200195195cfecc4de311adfad6f5b6ad62f767f70d9cffc83a69a9abe1911
I2P 0.9.27
Posted Oct 21, 2016
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
SHA-256 | 89808fa062735fc880d28d232fae27028d9ecdc13b1695a251ecfec119bc15da
Ubuntu Security Notice USN-3108-1
Posted Oct 21, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3108-1 - Toshifumi Sakaguchi discovered that Bind incorrectly handled certain packets with malformed options. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-2848
SHA-256 | 1825157108134d56ce557d85f3c881f0923ca4fb6df7cd65742768414ccecfb1
Red Hat Security Advisory 2016-2093-01
Posted Oct 21, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2093-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2848
SHA-256 | 3ad95d743a9e68225f25748c5f705b7a39525284c37ad0848988e10dc6ac38fb
Red Hat Security Advisory 2016-2094-01
Posted Oct 21, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2094-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2848
SHA-256 | 752e005fbb17eb10e18a548e65192e9500deb13006d873420adbf6f114913029
DirtyCow Local Root Proof Of Concept
Posted Oct 21, 2016
Authored by Robin Verton

DirtyCow local root proof of concept exploit that overwrites passwd.

tags | exploit, local, root, proof of concept
advisories | CVE-2016-5195
SHA-256 | df34e9d762c2e604ca92f005965b39f3d5c491ae429c86602f59d50276e01130
DirtyCow Linux Kernel Race Condition
Posted Oct 21, 2016
Authored by dirtycow, Phil Oester | Site github.com

This exploit demonstrates a race condition in the Linux kernel's memory subsystem and how it handles the copy-on-write (COW) breakage of private read-only memory mappings.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-5195
SHA-256 | 66f0d371847846244dcd8ca3ba1f670948e6a16d39249d179055d3ecedda7587
MiCasa VeraLite Remote Code Execution
Posted Oct 21, 2016
Authored by Jacob Baines

MiCasa VeraLite suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2013-4863, CVE-2016-6255
SHA-256 | e2fa6f6c7824d24f583c86b619b23b954606081e1f506dd4d6889669dfd00c1a
Classifieds Rental Script SQL Injection
Posted Oct 21, 2016
Authored by Arbin Godar

Classifieds Rental Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f735375ab02239b1b8ab11571ca3aeaac094a9c0091b1c58c32e709cb7e88369
Just Dial Clone Script SQL Injection
Posted Oct 21, 2016
Authored by Arbin Godar

Just Dial Clone Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1ca19380b9b2214f90d90d4fc0058bf37318fdee10d0efd25e8a9c258b9ea02d
Event Calendar PHP 1.5 Cross Site Request Forgery
Posted Oct 21, 2016
Authored by Ehsan Hosseini

Event Calendar PHP version 1.5 suffers from a cross site request forgery vulnerability.

tags | exploit, php, csrf
SHA-256 | 5aac80868d176cc81a1785575d3e03c4e3fab542003ebccb48c567d38dd0a5e9
Event Calendar PHP 1.5 SQL Injection
Posted Oct 21, 2016
Authored by Ehsan Hosseini

Event Calendar PHP version 1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 90cae4bf5c5fd8cc1c2accede370cf72c3ce0cc770fafdaf435dac78861f849f
Telegram Web 0.5.5 Username Bypass
Posted Oct 21, 2016
Authored by MALWaRE43

Telegram Web version 0.5.5 allows you to set a null username due to a client-side mitigation for null bytes.

tags | exploit, web, bypass
SHA-256 | 16af597f88d77a1c914473743da4564eaf920edf68bdfa8a1cbb5d1dec0f3ecd
WordPress Userpro Remote File Upload
Posted Oct 21, 2016
Authored by T3rm!nat0r5 | Site metasploit.com

This Metasploit module exploits an arbitrary PHP code upload in thewordpress Ifileupload plugin, The vulnerability allows for unauthorization file upload and remote code execution.

tags | exploit, remote, arbitrary, php, code execution, file upload
SHA-256 | 87a41f63c3eb9b9982f0c58c4cbca146127cb521768b08d69c288edc0c376891
Microsoft Visual Studio 2010 DLL Hijacking
Posted Oct 21, 2016
Authored by Ehsan Hosseini

Microsoft Visual Studio 2010 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | d212488925b4776c7e3e66335b8a529a94b4ec6600a4429a712b72399ec4f2eb
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close