what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 30 of 30 RSS Feed

Files Date: 2012-11-02 to 2012-11-03

Mobius Forensic Toolkit 0.5.15
Posted Nov 2, 2012
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The Partition Viewer extension provides a viewer for partition tables. The GTK-UI Treeview extension implements a treeview based on treenodes. Minor improvements have been made.
tags | tool, python, forensics
systems | unix
SHA-256 | 38e766cf40044e08fdb57a7f66853eb21928dc26ccea8bd60c7bef95d748732a
Suricata IDPE 1.3.3
Posted Nov 2, 2012
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release fixes several accuracy and stability issues, several false positives, and a file extraction corruption bug.
tags | tool, intrusion detection
systems | unix
SHA-256 | b38dcaaf4df8c7a128506c7a66d2da4df60d2531715f34b5aa4194367875b544
HP Intelligent Management Center UAM Buffer Overflow
Posted Nov 2, 2012
Authored by sinn3r, juan vazquez, e6af8de8b1d4b2b6d5ba2610cbf9cd38 | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in HP Intelligent Management Center UAM. The vulnerability exists in the uam.exe component, when using sprint in a insecure way for logging purposes. The vulnerability can be triggered by sending a malformed packet to the 1811/UDP port. The module has been successfully tested on HP iMC 5.0 E0101 and UAM 5.0 E0102 over Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, udp
systems | windows
advisories | OSVDB-85060
SHA-256 | ac8cdc8e8017e39159b8c147cb07c719d3801fc71b487e702a1f8e5c81fd7c8c
Mandriva Linux Security Advisory 2012-169
Posted Nov 2, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-169 - Multiple security issues were identified and fixed in OpenJDK (icedtea6). The fixes include, but are not limited to the TLS implementation changed to better adhere to the RFC, ScriptEngine permissions corrected, a conditional usage check being fixed, and many other fixes. The updated packages provide icedtea6-1.11.5 which is not vulnerable to these issues.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-3216, CVE-2012-5068, CVE-2012-5077, CVE-2012-5073, CVE-2012-5075, CVE-2012-5072, CVE-2012-5081, CVE-2012-5069, CVE-2012-5085, CVE-2012-5071, CVE-2012-5084, CVE-2012-5086, CVE-2012-5979, CVE-2012-5089, CVE-2012-4416
SHA-256 | e4077730c7d81834acc0b5d8b880afb5f35db6decc2220e7bf3b97b8a346ad4c
Debian Security Advisory 2570-1
Posted Nov 2, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2570-1 - High-Tech Bridge SA Security Research Lab discovered multiple null-pointer dereferences based vulnerabilities in OpenOffice which could cause application crash or even arbitrary code execution using specially crafted files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (MS Powerpoint 2003) and XLS (MS Excel 2003).

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, debian
advisories | CVE-2012-4233
SHA-256 | 085e4efc14f040b4a68ba6855b123f14484a690ca6e78d4c3eb6d524c751a115
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close