Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2017-08-20

Mandos Encrypted File System Unattended Reboot Utility 1.7.16
Posted Aug 20, 2017
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
MD5 | d694d33862f94414bfbdbacf1ecd6475
FireHOL 3.1.4
Posted Aug 20, 2017
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Google hangouts port range fix. Fixed hashlimit option names. Various other updates.
tags | tool, spoof, firewall
systems | linux, unix
MD5 | c58707b903c52d66875ebe26b752501a
TP-Link TD-W8901G Default Credentials / Authentcation Bypass
Posted Aug 20, 2017
Authored by Vuppala Dhanunjaya

TP-Link TD-W8901G suffers from default credential and authentication bypass vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 2b06bcd4f13729f6039bab7de4d929b7
Microsoft Edge Chakra NULL Pointer Dereference
Posted Aug 20, 2017
Authored by He Xiaoxiao, Huang Anwen

Microsoft Edge Chakra suffers from a null pointer dereference vulnerability.

tags | exploit
advisories | CVE-2017-8636
MD5 | 1e8d0ccd928df284ba3b75f58f8130ad
Microsoft Edge Chakra Heap Buffer Overflow
Posted Aug 20, 2017
Authored by He Xiaoxiao, Huang Anwen

Microsoft Edge Chakra suffers from a heap buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-8636
MD5 | f94fa7b9f1dc8ab45c020e896455480c
LiveCRM 1.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

LiveCRM version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 693b73c75fd92d01b354891394be54f4
Mozilla Firefox nsHtml5TreeBuilder Use-After-Free
Posted Aug 20, 2017
Authored by Hans Jerry Illikainen, ca0nguyen

Mozilla Firefox versions prior to 45 nsHtml5TreeBuilder use-after-free exploit with EMET 5.52 bypass.

tags | exploit
advisories | CVE-2016-1960
MD5 | 8008f48b0fd538cf58c28aaca53512bf
Easy DVD Creator 2.5.11 Buffer Overflow
Posted Aug 20, 2017
Authored by Anurag Srivastava

Easy DVD Creator version 2.5.11 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | c72b229ca2592484b78e8c056de24589
Joomla KissGallery 1.0.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

Joomla KissGallery component version 1.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3a0ffba79f98140df37629c75d03ed00
LiveSupport 1.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

LiveSupport version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | cc9797bea31aa538c5871e56cc953e62
Matrimony Script 2.7 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

Matrimony Script version 2.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 94dd2a7ede7b95449bb4e7d738bab85f
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    8 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close