exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-03-21 to 2016-03-22

Mandos Encrypted File System Unattended Reboot Utility 1.7.7
Posted Mar 21, 2016
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
SHA-256 | d3bc30d36b68934151ef822d9b09df7f1559297ee1330e96520e588c0a846f68
IP-Array IPTables Firewall Script 1.2.1
Posted Mar 21, 2016
Authored by AllKind | Site ip-array.sourceforge.net

A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.

Changes: The old /proc filesystem PROC_* variable configuration system has been removed. Now the system settings are done using the sysctl program. The sysctl rules are now written in XML. A sysctl builder has been added to the interactive mode, allowing to create sysctl rule files easily. A bash completion compspec has been added. An uninstall script has been added. Parsing of XML files by category is now possible even if not in parse-xml mode. Various fixes and improvements.
tags | tool
systems | linux, unix
SHA-256 | de001b81914740972faf4bd4d0ea388e8757a9bfd02dd6b63707be348929904a
NetSTR 0.19
Posted Mar 21, 2016
Authored by Jay Fink | Site systhread.net

NetSTR is an open source small, fast and easy to use port scanner and packet sniffer. IPv4 scanner can perform ranged, single or use an internal top ports list plus it has a flexible timers/port capability. IPv6 single port single host is supported. The tcp and arp sniffers print an easy to read dump format and have a full packet decode capability. Additionally netstr sports a fuzzy passive network scanner.

Changes: Timer bugfix on ipv4scan, start/stop times for scan6 and fast option bugfix.
tags | tool, scanner, tcp
systems | unix
SHA-256 | 0362e46af780f0720501428c67c098df5a2b564a8a01114787c8fa2a054d6ab9
AbsoluteTelnet 10.14 DLL Hijacking
Posted Mar 21, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

AbsoluteTelnet version 10.14 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 2129cfd8f7159c9f48e17173b9fc9fa7e5f92f84ba90cf738827dec0c074e314
Debian Security Advisory 3524-1
Posted Mar 21, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3524-1 - It was discovered that the ActiveMQ Java message broker performs unsafe deserialisation.

tags | advisory, java
systems | linux, debian
advisories | CVE-2015-5254
SHA-256 | 026b81c4d359d32407cfe76c07ba260baa12c3e323b769a5d33716a3084332f1
Debian Security Advisory 3523-1
Posted Mar 21, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3523-1 - This update disables the Graphite font shaping library in Iceweasel, Debian's version of the Mozilla Firefox web browser.

tags | advisory, web
systems | linux, debian
SHA-256 | 9f095db66403e6e64901b6b96e7c04301c954031a92adbe3c56644313c733be4
Debian Security Advisory 3522-1
Posted Mar 21, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3522-1 - Alex Rousskov from The Measurement Factory discovered that Squid3, a fully featured web proxy cache, does not properly handle errors for certain malformed HTTP responses. A remote HTTP server can exploit this flaw to cause a denial of service (assertion failure and daemon exit).

tags | advisory, remote, web, denial of service
systems | linux, debian
advisories | CVE-2016-2571
SHA-256 | 58240e40d13b60c6570f863ede1323dd5c628f7d8e2318d7a363cb0785cd9fc2
Gentoo Linux Security Advisory 201603-15
Posted Mar 21, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201603-15 - Multiple vulnerabilities have been found in OpenSSL, the worst allowing remote attackers to decrypt TLS sessions. Versions less than 1.0.2g-r2 are affected.

tags | advisory, remote, vulnerability
systems | linux, gentoo
advisories | CVE-2016-0702, CVE-2016-0703, CVE-2016-0704, CVE-2016-0705, CVE-2016-0797, CVE-2016-0798, CVE-2016-0799, CVE-2016-0800
SHA-256 | 6f0722d9e284f07b269abf7998e9e52da12fdf8dcb8e32ab4f709a7b253f0481
D-Link DWR-932 Authentication Bypass / Password Disclosure
Posted Mar 21, 2016
Authored by Saeed reza Zamanian

D-Link DWR-932 with firmware versions 4.00 and below suffer from authentication bypass and password disclosure vulnerabilities.

tags | exploit, vulnerability, bypass
SHA-256 | f86505f0c1e4921225059a0b8cf6188a72de7d3c8ab3ee65fa7c5bc636a0fd1b
WordPress eBook Download 1.1 Directory Traversal
Posted Mar 21, 2016
Authored by Wadeek

WordPress eBook Download plugin version 1.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 318fb4f76e3092c8ff33ac73fd09fc95ac7ed8b8879301abfb411e910e2b8bba
WordPress Import CSV 1.1 Directory Traversal
Posted Mar 21, 2016
Authored by Wadeek

WordPress Import CSV plugin version 1.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 707a5fc82a6731639583d67130bd989dfed85f9b4b0f10af7dcc9e0f8b036b3c
AsusTEK asio.sys MSR Manipulation
Posted Mar 21, 2016
Authored by 0x3d5157636b525761

AsusTEK asio.sys driver accepts IOCTLs that allow the user to freely manipulate MSRs.

tags | advisory
SHA-256 | 325593d3acbc08d615dd99f440693508f61114fcd70ff4a0997008168a95e16c
DORG Cross Site Scripting / SQL Injection
Posted Mar 21, 2016
Authored by SECUPENT

DORG Disc Organization System suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | b7f23955a8300938467a5000dab30ca14634b797f3fb1d7e029e85191454903c
Wildfly Filter Restriction Bypass / Information Disclosure
Posted Mar 21, 2016
Authored by Tal Solomon

Wildfly versions prior to 10.0.0.Final, including 9.0.2.Final, and 8.2.1.Final suffer from a WEB-INF and META-INF information disclosure issue via a filter restriction bypass vulnerability. Video included showing the proof of concept.

tags | exploit, web, proof of concept, bypass, info disclosure
systems | linux
advisories | CVE-2016-0793
SHA-256 | 702a857da000ebd458a935e4fbf17d96d7f77f33e1ef8aaa494e4206bfa48f76
WordPress Abtest Local File Inclusion
Posted Mar 21, 2016
Authored by CrashBandicot

WordPress Abtest plugin suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 4dfd25d83af233008ae8fd8f81633e2601547ac29e44fd477dde61fa603cb041
Netgear DGNv2200 Authorization Bypass / Command Injection
Posted Mar 21, 2016
Authored by 0x3d5157636b525761

Netgear DGNv2200 suffers from authentication bypass, memory corruption, and cross site request forgery vulnerabilities.

tags | advisory, vulnerability, bypass, csrf
SHA-256 | 296e35b157692cccfcf1d5b18bf0d85519166c302d3e42c4cbe9e05b4677ee2b
Sysax Multi Server 6.50 SEH Overflow
Posted Mar 21, 2016
Authored by Paul Purcell

Sysax Multi Server version 6.50 HTTP file share SEH overflow remote code execution exploit.

tags | exploit, remote, web, overflow, code execution
SHA-256 | c00ceddd52d084e84687306a20618247ce5e46f255ec2f4e36d4c94b92151b3f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close