exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2020-03-21

Hyperion Runtime Encrypter 2.3
Posted Mar 21, 2020
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Hyperion now rejects unsupported .NET executables, preserves the GUI/Commandline PE flag, has a lower AV detection because static stuff was removed, and 64 bit output file size was reduced by 4 kilo bytes.
tags | tool, encryption
SHA-256 | 2364513b2f75c3dc33a2b0a95b24e345d7dbe8fb2c3717c63cb058613b286779
Imperial College COVID-19 Response Team Report
Posted Mar 21, 2020
Authored by Imperial College | Site imperial.ac.uk

The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.

tags | paper, virus
SHA-256 | 972c8783670e8ae617a1b4285efe8a6db663ee2bdca09806ab2ea5bc268737e1
GNU Privacy Guard 2.2.20
Posted Mar 21, 2020
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Update added to protect the error counter against overflow. Various other bug fixes.
tags | tool, encryption
SHA-256 | 04a7c9d48b74c399168ee8270e548588ddbe52218c337703d7f06373d326ca30
Gentoo Linux Security Advisory 202003-48
Posted Mar 21, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202003-48 - Multiple vulnerabilities have been found in Node.js, worst of which could allow remote attackers to write arbitrary files. Versions less than 12.15.0 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-12115, CVE-2018-12116, CVE-2018-12121, CVE-2018-12122, CVE-2018-12123, CVE-2018-7161, CVE-2018-7162, CVE-2018-7164, CVE-2018-7167, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-16777, CVE-2019-5737, CVE-2019-5739
SHA-256 | 74cfd9bd90d2d33e764c86a5e1c80a6b642e808e00a02002d6d17c9467102fb0
Gentoo Linux Security Advisory 202003-47
Posted Mar 21, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202003-47 - A vulnerability in Exim could allow a remote attacker to execute arbitrary code. Versions less than 4.92.3 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2019-16928
SHA-256 | 0762c2fa4752d37053ab236420b2917d9142e424d887c6606dc3d44806c71b8f
Avast Secure Browser 76.0.1659.101 Local Privilege Escalation
Posted Mar 21, 2020
Authored by Silton Santos

A local privilege escalation issue was discovered in Avast Secure Browser version 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates.

tags | advisory, local
advisories | CVE-2019-17190
SHA-256 | c3807d4734d35255ec28f3968e435a787e351216fcadf4013c873c8d1ea9df67
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close