what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2013-02-12 to 2013-02-13

Atmel AT91SAM7XC Crypto Key Recovery
Posted Feb 12, 2013
Authored by Adam Laurie

The Atmel AT91SAM7XC series of microprocessors suffer from a cryptography key recovery vulnerability due to poor memory management.

tags | advisory
SHA-256 | 80605c235bcc22f94440751343582715f585c992b025d852b58958950e3b68cb
IPSet Bash Completion 1.9
Posted Feb 12, 2013
Authored by AllKind | Site sourceforge.net

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.

tags | tool, shell, firewall, bash
systems | linux, unix
SHA-256 | 7d12affbeb448d8cdc343a6ae9a8e3aad5f2c829a8a167c1843d16a143ec3840
ipset_list 2.6
Posted Feb 12, 2013
Authored by AllKind | Site sourceforge.net

ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. Optionally, the output can be colorized.

Changes: This release adds an option to exclude glob matching sets from listing. Which colors to use can now be defined by the user. Also new is the bash completion code, which allows you to retrieve and complete options interactively on the command line.
tags | tool, firewall
systems | linux, unix
SHA-256 | b14d55bcbf2ebebae3e1b719fc2ad988219a10b7aecce8ba4af114f09c41461d
Net-War Reaver Wrapper
Posted Feb 12, 2013
Authored by Sven Wurth

This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl.

tags | tool, perl, wireless
SHA-256 | 77f6680aaa3369a21bf84af444e0c5a958ed4d7faae9912a95ebde099266e156
Brother HL5370 Command Execution / Password Guessing
Posted Feb 12, 2013

Brother HL5370 printers suffer from arbitrary command execution and trivial password guessing.

tags | exploit, arbitrary
SHA-256 | bb7dcc80515b1fae40d34587ce5811e48bdec93f2a09a9cdafe16aaaa95990b4
Apache CXF WS-Security UsernameToken Bypass
Posted Feb 12, 2013
Site cxf.apache.org

Apache CXF suffers from a UsernameToken WS-SecurityPolicy bypass vulnerability. This vulnerability affects all versions of Apache CXF prior to 2.5.9, 2.6.6 and 2.7.3.

tags | advisory, bypass
advisories | CVE-2013-0239
SHA-256 | 4eaa2f6027239acfb181ad63ada1307b505ff3e1a2a33005786ae1d6605024a0
Apache CXF WS-Security URIMappingInterceptor Bypass
Posted Feb 12, 2013
Site cxf.apache.org

Apache CXF suffers from a vulnerability when a simple SOAP service is secured with the WSS4JInInterceptor, which enables WS-Security processing of the request. WS-Security processing is completely bypassed in the case of a HTTP GET request, and so access to the service can be enabled by the URIMappingInterceptor. This vulnerability affects all versions of Apache CXF prior to 2.5.8, 2.6.5 and 2.7.2. CXF 2.7.1 is not affected by default, however the vulnerability exists if you are explicitly adding the URIMappingInterceptor to the default chain.

tags | advisory, web
advisories | CVE-2012-5633
SHA-256 | db48a46ed14115b58114df032443a8b3b6b13b1175a368c2efb1110f6877b6fd
Novell GroupWise Client gwcls1.dll ActiveX Remote Code Execution
Posted Feb 12, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in the Novell GroupWise Client gwcls1.dll ActiveX. Several methods in the GWCalServer control use user provided data as a pointer, which allows to read arbitrary memory and execute arbitrary code. This Metasploit module has been tested successfully with GroupWise Client 2012 on IE6 - IE9. The JRE6 needs to be installed to achieve ASLR bypass.

tags | exploit, arbitrary, activex
advisories | CVE-2012-0439, OSVDB-89700
SHA-256 | 2bb2812e974be928ec96a6f900361814c1ad01f386937d1ecad587eb0c260f83
Mandriva Linux Security Advisory 2013-010
Posted Feb 12, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-010 - Multiple security issues were identified and fixed in OpenJDK. The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues.

tags | advisory
systems | linux, mandriva
advisories | CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0429, CVE-2013-0432, CVE-2013-0443, CVE-2013-0440, CVE-2013-0442, CVE-2013-0428, CVE-2013-0441, CVE-2013-0435, CVE-2013-0433, CVE-2013-0450, CVE-2013-1475, CVE-2013-1476, CVE-2013-0434, CVE-2013-1478, CVE-2013-1480
SHA-256 | c969e5649ff8c0438fc75c05091dea0b22ca3f91072532f86108cdc5f23005c4
Mandriva Linux Security Advisory 2013-009
Posted Feb 12, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-009 - The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service via a Client: Diffie-Hellman Key Exchange Init packet. The updated packages have been upgraded to the 0.5.4 version which is not affected by this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2013-0176
SHA-256 | 73870dce1b583b2ef4bd04b7c63752c6b3bffe0ed145b165bcd9794b9ffe441b
osCommerce 2.3.3 Cross Site Request Forgery
Posted Feb 12, 2013
Authored by Jakub Galczyk

osCommerce version 2.3.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 6899dfd0aba24fae96fc8aca3b04644601579d6527c6c1b6a86f31ffeb009ade
Web Exploitation Engine 0.1
Posted Feb 12, 2013
Authored by infodox, LaNMaSteR53

This is a simple utility for exploiting command injection vulnerabilities in web applications. Supports POST and GET requests. Can deliver an "inline shell" or a (python) reverse shell.

tags | tool, web, shell, vulnerability, rootkit, python
systems | unix
SHA-256 | 2c82dcde1a7835fac49946c2d7c022271f0105c0e8c280133632994e909508cd
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close