exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 30 of 30 RSS Feed

Files Date: 2012-11-02 to 2012-11-03

Mobius Forensic Toolkit 0.5.15
Posted Nov 2, 2012
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The Partition Viewer extension provides a viewer for partition tables. The GTK-UI Treeview extension implements a treeview based on treenodes. Minor improvements have been made.
tags | tool, python, forensics
systems | unix
SHA-256 | 38e766cf40044e08fdb57a7f66853eb21928dc26ccea8bd60c7bef95d748732a
Suricata IDPE 1.3.3
Posted Nov 2, 2012
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release fixes several accuracy and stability issues, several false positives, and a file extraction corruption bug.
tags | tool, intrusion detection
systems | unix
SHA-256 | b38dcaaf4df8c7a128506c7a66d2da4df60d2531715f34b5aa4194367875b544
HP Intelligent Management Center UAM Buffer Overflow
Posted Nov 2, 2012
Authored by sinn3r, juan vazquez, e6af8de8b1d4b2b6d5ba2610cbf9cd38 | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in HP Intelligent Management Center UAM. The vulnerability exists in the uam.exe component, when using sprint in a insecure way for logging purposes. The vulnerability can be triggered by sending a malformed packet to the 1811/UDP port. The module has been successfully tested on HP iMC 5.0 E0101 and UAM 5.0 E0102 over Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, udp
systems | windows
advisories | OSVDB-85060
SHA-256 | ac8cdc8e8017e39159b8c147cb07c719d3801fc71b487e702a1f8e5c81fd7c8c
Mandriva Linux Security Advisory 2012-169
Posted Nov 2, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-169 - Multiple security issues were identified and fixed in OpenJDK (icedtea6). The fixes include, but are not limited to the TLS implementation changed to better adhere to the RFC, ScriptEngine permissions corrected, a conditional usage check being fixed, and many other fixes. The updated packages provide icedtea6-1.11.5 which is not vulnerable to these issues.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-3216, CVE-2012-5068, CVE-2012-5077, CVE-2012-5073, CVE-2012-5075, CVE-2012-5072, CVE-2012-5081, CVE-2012-5069, CVE-2012-5085, CVE-2012-5071, CVE-2012-5084, CVE-2012-5086, CVE-2012-5979, CVE-2012-5089, CVE-2012-4416
SHA-256 | e4077730c7d81834acc0b5d8b880afb5f35db6decc2220e7bf3b97b8a346ad4c
Debian Security Advisory 2570-1
Posted Nov 2, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2570-1 - High-Tech Bridge SA Security Research Lab discovered multiple null-pointer dereferences based vulnerabilities in OpenOffice which could cause application crash or even arbitrary code execution using specially crafted files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (MS Powerpoint 2003) and XLS (MS Excel 2003).

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, debian
advisories | CVE-2012-4233
SHA-256 | 085e4efc14f040b4a68ba6855b123f14484a690ca6e78d4c3eb6d524c751a115
Page 2 of 2
Back12Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    13 Files
  • 28
    Sep 28th
    5 Files
  • 29
    Sep 29th
    12 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close