exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2018-09-10

LW-N605R Remote Code Execution
Posted Sep 10, 2018
Authored by Nassim Asrir

LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.

tags | exploit, remote, shell, code execution, asp
advisories | CVE-2018-16752
MD5 | 381dfb828206901640b7a36fed462414
Microsoft Baseline Security Analyzer 2.3 XML Injection
Posted Sep 10, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Baseline Security Analyzer version 2.3 suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | 7224f7e70a591fdfca03428610d0453c
Samhain File Integrity Checker 4.3.0
Posted Sep 10, 2018
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Added support for /etc/subuid, /etc/subgid maps. Fixed compiler warning on Ubuntu 18.04.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 54591d3bbe3ff0ea837d88310d6bb74a
Bitter-Harvest: Systemically Fingerprint Low And Medium Interaction Honeypots At Internet Scale
Posted Sep 10, 2018
Authored by Alexander Vetterl, Richard Clayton

Whitepaper called Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.

tags | paper
MD5 | f2578a6913f261534323d76a728a7117
Open Source Intelligence Gathering 201
Posted Sep 10, 2018
Authored by appsecco

Whitepaper called Open Source Intelligence Gathering 201. It covers 12 additional techniques.

tags | paper
MD5 | dd71ed5e76183c0396985e6f775d2d2a
Avaya one-X 9.x / 10.0.x / 10.1.x Arbitrary File Disclosure / Deletion
Posted Sep 10, 2018
Authored by Pedro Andujar

Avaya one-X versions 9.x, 10.0.x, and 10.1.x suffer from arbitrary file disclosure and deletion vulnerabilities.

tags | exploit, arbitrary, vulnerability
advisories | CVE-2018-15610
MD5 | 19f5b0846706f9c5967437b6d530042e
Any Sound Recorder 2.93 Denial Of Service
Posted Sep 10, 2018
Authored by T3jv1l

Any Sound Recorder version 2.93 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | e288d6e98191abb10faebda958f0837e
Hypervisor From Scratch - Part 2: Entering VMX Operation
Posted Sep 10, 2018
Authored by Sinaei

This is the second part of a multiple series of a tutorial called "Hypervisor From Scratch". This paper focuses on Entering VMX Operation.

tags | paper
MD5 | e9b7178d774bf75eda15292ace347f55
Zenmap (Nmap) 7.70 Denial Of Service
Posted Sep 10, 2018
Authored by Gionathan Reale

Zenmap (Nmap) version 7.70 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | ed8bb1b4f7ddf277a8815746e9e064bb
Out Of Band Exploitation (OOB) CheatSheet
Posted Sep 10, 2018
Authored by NotSoSecure

This whitepaper is an out of band exploitation cheatsheet.

tags | paper
MD5 | f7025ac28c448e3857389f254c2cc20e
Photo To Video Converter Professional 8.07 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Photo To Video Converter Professional version 8.07 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 83ae00a910c8213726af8ee73a0f1643
Flash Slideshow Maker Professional 5.20 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Flash Slideshow Maker Professional version 5.20 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 96777c75e7183d893bf1059ef37c9a90
Hypervisor From Scratch - Part 1: Basic Concepts And Configure Testing Environment
Posted Sep 10, 2018
Authored by Sinaei

This is the first part of a multi-part series of tutorials called "Hypervisor From Scratch". As the name implies, this course contains technical details to create a basic Virtual Machine based on hardware virtualization. If you follow the course, you will be able to create your own virtual environment and you will get an understanding of how VMWare, VirtualBox, KVM and other virtualization sores use processors' facilities to create a virtual environment.

tags | paper
MD5 | a447980133afcd4e1931f17313c959b5
How We Micropatched A Publicly Dropped 0day In Task Scheduler
Posted Sep 10, 2018
Authored by Mitja Kolsek

Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.

tags | paper
MD5 | 391792ec5cdae832b6dbcc61506e6758
Socusoft 3GP Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Socusoft 3GP Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | db23abb25a525dd63434a5c5b00f4516
SocuSoft iPod Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

SocuSoft iPod Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 75b0bdbc1304ebaa9de77b9671f5c5a0
Page 1 of 1
Back1Next

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close