Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed

Files Date: 2018-04-08

Steamed Hams
Posted Apr 8, 2018
Authored by bcook-r7

While similar to exploit/multi/handler, this Metasploit module also provides an unforgettable luncheon experience. It's also a handy method of synchronizing your exploit window with your buddies, a-la Hudson Hawk. Multiple targets and payloads are supported.

tags | exploit
MD5 | 6501709f9a3c50919b2e5264b99b7921
Gentoo Linux Security Advisory 201804-05
Posted Apr 8, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201804-5 - Multiple vulnerabilities have been found in ISC DHCP, the worst of which could allow for the remote execution of arbitrary code. Versions less than 4.3.6_p1 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2017-3144, CVE-2018-5732, CVE-2018-5733
MD5 | 62fd572b61cd226737b1d257964ff493
Gentoo Linux Security Advisory 201804-03
Posted Apr 8, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201804-3 - Multiple vulnerabilities have been found in Poppler, the worst of which could allow a Denial of Service. Versions less than 0.61.1 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2017-1000456, CVE-2017-14975, CVE-2017-14976, CVE-2017-14977
MD5 | 2a62047d6ebb4a7276202fbdedb3e91a
Gentoo Linux Security Advisory 201804-04
Posted Apr 8, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201804-4 - Multiple vulnerabilities have been found in cURL, the worst of which could result in a Denial of Service condition. Versions less than 7.59.0 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2018-1000005, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122
MD5 | 46d1c454440c17efaee2adb06ab1229d
The Grey Matter Of Securing Android Applications
Posted Apr 8, 2018
Authored by Shiv Sahni

Whitepaper called The Grey Matter of Securing Android Applications. It starts with the introduction of the Android platform and fundamentals of the Android applications. It later talks about the in-built security features of the Android platform and the additional features that are provided by Google to build a secure ecosystem. It also includes how and why these features can be leveraged to build secure Android applications.

tags | paper
MD5 | 5b291cb65b443bd1435c7d5264cbe7f7
Debian Security Advisory 4168-1
Posted Apr 8, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4168-1 - Florian Grunow und Birk Kauer of ERNW discovered a path traversal vulnerability in SquirrelMail, a webmail application, allowing an authenticated remote attacker to retrieve or delete arbitrary files via mail attachment.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2018-8741
MD5 | d000cb85a6de6f1ddf529a8977b9d853
Page 1 of 1
Back1Next

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close