Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files Date: 2018-09-10

LW-N605R Remote Code Execution
Posted Sep 10, 2018
Authored by Nassim Asrir

LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.

tags | exploit, remote, shell, code execution, asp
advisories | CVE-2018-16752
MD5 | 381dfb828206901640b7a36fed462414
Microsoft Baseline Security Analyzer 2.3 XML Injection
Posted Sep 10, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Baseline Security Analyzer version 2.3 suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | 7224f7e70a591fdfca03428610d0453c
Samhain File Integrity Checker 4.3.0
Posted Sep 10, 2018
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Added support for /etc/subuid, /etc/subgid maps. Fixed compiler warning on Ubuntu 18.04.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 54591d3bbe3ff0ea837d88310d6bb74a
Bitter-Harvest: Systemically Fingerprint Low And Medium Interaction Honeypots At Internet Scale
Posted Sep 10, 2018
Authored by Alexander Vetterl, Richard Clayton

Whitepaper called Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.

tags | paper
MD5 | f2578a6913f261534323d76a728a7117
Open Source Intelligence Gathering 201
Posted Sep 10, 2018
Authored by appsecco

Whitepaper called Open Source Intelligence Gathering 201. It covers 12 additional techniques.

tags | paper
MD5 | dd71ed5e76183c0396985e6f775d2d2a
Avaya one-X 9.x / 10.0.x / 10.1.x Arbitrary File Disclosure / Deletion
Posted Sep 10, 2018
Authored by Pedro Andujar

Avaya one-X versions 9.x, 10.0.x, and 10.1.x suffer from arbitrary file disclosure and deletion vulnerabilities.

tags | exploit, arbitrary, vulnerability
advisories | CVE-2018-15610
MD5 | 19f5b0846706f9c5967437b6d530042e
Any Sound Recorder 2.93 Denial Of Service
Posted Sep 10, 2018
Authored by T3jv1l

Any Sound Recorder version 2.93 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | e288d6e98191abb10faebda958f0837e
Hypervisor From Scratch - Part 2: Entering VMX Operation
Posted Sep 10, 2018
Authored by Sinaei

This is the second part of a multiple series of a tutorial called "Hypervisor From Scratch". This paper focuses on Entering VMX Operation.

tags | paper
MD5 | e9b7178d774bf75eda15292ace347f55
Zenmap (Nmap) 7.70 Denial Of Service
Posted Sep 10, 2018
Authored by Gionathan Reale

Zenmap (Nmap) version 7.70 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | ed8bb1b4f7ddf277a8815746e9e064bb
Out Of Band Exploitation (OOB) CheatSheet
Posted Sep 10, 2018
Authored by NotSoSecure

This whitepaper is an out of band exploitation cheatsheet.

tags | paper
MD5 | f7025ac28c448e3857389f254c2cc20e
Photo To Video Converter Professional 8.07 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Photo To Video Converter Professional version 8.07 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 83ae00a910c8213726af8ee73a0f1643
Flash Slideshow Maker Professional 5.20 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Flash Slideshow Maker Professional version 5.20 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 96777c75e7183d893bf1059ef37c9a90
Hypervisor From Scratch - Part 1: Basic Concepts And Configure Testing Environment
Posted Sep 10, 2018
Authored by Sinaei

This is the first part of a multi-part series of tutorials called "Hypervisor From Scratch". As the name implies, this course contains technical details to create a basic Virtual Machine based on hardware virtualization. If you follow the course, you will be able to create your own virtual environment and you will get an understanding of how VMWare, VirtualBox, KVM and other virtualization sores use processors' facilities to create a virtual environment.

tags | paper
MD5 | a447980133afcd4e1931f17313c959b5
How We Micropatched A Publicly Dropped 0day In Task Scheduler
Posted Sep 10, 2018
Authored by Mitja Kolsek

Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.

tags | paper
MD5 | 391792ec5cdae832b6dbcc61506e6758
Socusoft 3GP Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Socusoft 3GP Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | db23abb25a525dd63434a5c5b00f4516
SocuSoft iPod Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

SocuSoft iPod Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 75b0bdbc1304ebaa9de77b9671f5c5a0
Page 1 of 1
Back1Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close