what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2013-12-24 to 2013-12-25

TOR Virtual Network Tunneling Tool 0.2.4.20
Posted Dec 24, 2013
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes potentially poor random number generation for users who use OpenSSL 1.0.0 or later, set "HardwareAccel 1" in their torrc file, have "Sandy Bridge" or "Ivy Bridge" Intel processors, and have no state file in their DataDirectory (as would happen on first start). Users who generated relay or hidden service identity keys in such a situation should discard them and generate new ones.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | ccc51747cbcbf98f658c34d5c693ff8a868698da0349d056e98287ef2e294d9f
EMC Replication Manager Unquoted File Path Enumeration
Posted Dec 24, 2013
Site emc.com

EMC Replication Manager allows a user to create scripts with unquoted element such as whitespace or other separators. This may allow local malicious users to access resources in a parent path and execute them. EMC Replication Manager versions prior to 5.5 are affected.

tags | advisory, local
advisories | CVE-2013-6182
SHA-256 | b948dc0ad5ffaaf7eb0f66688230f5dc850f3397c4b4081ed6c53a672c07ae19
EMC Watch4net Information Disclosure
Posted Dec 24, 2013
Site emc.com

EMC Watch4Net stores passwords of devices polled during monitoring in clear text in Watch4Net installation repository. This could allow a malicious user with access to Watch4Net installation repository to view those passwords. EMC Watch4Net versions prior to 6.3 are affected.

tags | advisory
advisories | CVE-2013-6181
SHA-256 | dd223f7be190cfe700a37714a67484eaa394ab4b6e2dd082260c0c252209f106
WinAppDbg Python Module 1.5
Posted Dec 24, 2013
Site sourceforge.net

The WinAppDbg python module allows developers to quickly add Windows application debugging facilities to your Python scripts.

Changes: Full 64-bit support. Added support for Windows Vista and above. Various other new additions and improvements.
tags | python
systems | windows
SHA-256 | 3ab478ea867b1109d65d3d8148d1cd5eb0f21ae6374036fec6fed7179a773ce4
Hook Analyser Malware Tool 3.0
Posted Dec 24, 2013
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: In terms of improvements, a new module has been added - Cyber Threat Intelligence.
tags | tool
SHA-256 | 60cd90856b59ffce547be69abf79b3ae7284db2920b97586609cbbea07708739
Debian Security Advisory 2827-1
Posted Dec 24, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2827-1 - It was discovered that Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications, incorrectly handled file names with NULL bytes in serialized instances. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.

tags | advisory, remote, web, arbitrary, file upload
systems | linux, debian
advisories | CVE-2013-2186
SHA-256 | b144c83429845a0742d8eec386e2ad9aa7daae1d23198f019d146d224192183a
Gentoo Linux Security Advisory 201312-15
Posted Dec 24, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201312-15 - A vulnerability has been found in Tinyproxy, allows remote attackers to cause a Denial of Service condition. Versions less than 1.8.3-r3 are affected.

tags | advisory, remote, denial of service
systems | linux, gentoo
advisories | CVE-2012-3505
SHA-256 | 85e01c27ae6ec0be5839386a9a96c871dca2dac77124a868264c5fd63d9bae9e
Dewplayer 2.2.2 Cross Site Scripting
Posted Dec 24, 2013
Authored by MustLive

Dewplayer version 2.2.2 suffers from cross site scripting and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss
SHA-256 | 5a1f3f71d04579c9bfde14b30a8e91bf8855a69002dd690629da538ec4ef6754
Fat Free CRM CSRF / SQL Injection / Known Secret
Posted Dec 24, 2013
Authored by joernchen

Fat Free CRM suffers from cross site request forgery, known session secret, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure, csrf
SHA-256 | e36735d125c4d5e421f622b4448eb7831f1aded7c14c184b6ede1eee0bf01c06
Android/ARM Elf Infector Proof Of Concept
Posted Dec 24, 2013
Authored by Eugenio Delfa

Android/ARM elf infector proof of concept ASM code.

tags | shellcode, proof of concept
SHA-256 | e1f47e3bd06cf037a03e50006494b0019715653b42c24b8ac39715c24ae83f42
Analysis Of The Rcrypt Packer
Posted Dec 24, 2013
Authored by rage | Site 0xrage.com

This is a paper detailing the rcrypt packer. This packer makes use of timelock puzzles and anti-analysis methods to frustrate AV detection via sandboxes and reverse engineering.

tags | paper
SHA-256 | ae703a2dec1c36e2768a99763fb1d003bad26b40c5330330b3c665e204bc66eb
xBoard 5.0 / 5.5 / 6.0 Local File Inclusion
Posted Dec 24, 2013
Authored by TUNISIAN CYBER

xBoard versions 5.0, 5.5, and 6.0 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | ea65a2314d43263c2ca2e1369ceedc90166a109931b14ab99de74043e36f9ae7
Qatar Booking Server Struts Execution
Posted Dec 24, 2013
Authored by Hackerdesk Team

booking.qatarairways.com suffers from a Struts vulnerability that allows for remote code execution. The authors have contacted Qatar but no one has responded nor fixed the issue. It is being published publicly to help convince them to remediate the issue.

tags | exploit, remote, code execution
SHA-256 | b48a16f763565d8b3796254051c67ef4cb6a511edc1d30e0f634b8ccf3e6a90a
WebPagetest 2.7 Local File Disclosure
Posted Dec 24, 2013
Authored by TUNISIAN CYBER

WebPagetest version 2.7 suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 57435b59f5fada7cf0b2b28770fccde94dfbd2552c0c550f09c2f9f521d61efa
WordPress Recommend Cross Site Scripting
Posted Dec 24, 2013
Authored by Ashiyane Digital Security Team

WordPress Recommend plugin suffers from a cross site scripting vulnerability. Note that these findings house site-specific data.

tags | exploit, xss
SHA-256 | 84b4c1e890f3ce3a47c8b869c6f834bc2675ceec8fe10b8a9976a8f6b0467086
Zen-Cart Database Backup Disclosure
Posted Dec 24, 2013
Authored by JoKeR_StEx

Zen-Cart version 1.5.1 suffers from a database backup disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 9061996cb9f8621ef614cb8cbdc9fe4527baec1b037503862ea03d28f3bad283
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close