what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2018-09-10 to 2018-09-11

LW-N605R Remote Code Execution
Posted Sep 10, 2018
Authored by Nassim Asrir

LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.

tags | exploit, remote, shell, code execution, asp
advisories | CVE-2018-16752
SHA-256 | 405a54b7328103d274033ba1718a79ec36e34a387798e6c349e7e6c74465d240
Microsoft Baseline Security Analyzer 2.3 XML Injection
Posted Sep 10, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Baseline Security Analyzer version 2.3 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | 93c391e34088d358a2e2c716523db9450646ff3ced21181d0a85858a46bc542d
Samhain File Integrity Checker 4.3.0
Posted Sep 10, 2018
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Added support for /etc/subuid, /etc/subgid maps. Fixed compiler warning on Ubuntu 18.04.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | f3680478943ea6e8fdb55d8362bf166850dd033b03f6ef9a38f2ed7422b9d929
Bitter-Harvest: Systemically Fingerprint Low And Medium Interaction Honeypots At Internet Scale
Posted Sep 10, 2018
Authored by Alexander Vetterl, Richard Clayton

Whitepaper called Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.

tags | paper
SHA-256 | 811cd201ac89a857b5fc25eef8ecb6f7b257c940273240e64655a62f279cc21a
Open Source Intelligence Gathering 201
Posted Sep 10, 2018
Authored by appsecco

Whitepaper called Open Source Intelligence Gathering 201. It covers 12 additional techniques.

tags | paper
SHA-256 | b899f11c6c0178b866c84ac330a21773a01c5d31f566b1bfa92ebb03531d22ef
Avaya one-X 9.x / 10.0.x / 10.1.x Arbitrary File Disclosure / Deletion
Posted Sep 10, 2018
Authored by Pedro Andujar

Avaya one-X versions 9.x, 10.0.x, and 10.1.x suffer from arbitrary file disclosure and deletion vulnerabilities.

tags | exploit, arbitrary, vulnerability
advisories | CVE-2018-15610
SHA-256 | fc1fefea9634475bbbb4693999d6ebf22e28f289b373c3065c44d068c1f14a41
Any Sound Recorder 2.93 Denial Of Service
Posted Sep 10, 2018
Authored by T3jv1l

Any Sound Recorder version 2.93 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 8933eb6e7dca5a81f21a4bf97ff0a15427be7d74b6768a6819de07426039f88f
Hypervisor From Scratch - Part 2: Entering VMX Operation
Posted Sep 10, 2018
Authored by Sinaei

This is the second part of a multiple series of a tutorial called "Hypervisor From Scratch". This paper focuses on Entering VMX Operation.

tags | paper
SHA-256 | 9b63376d7f63c5f5a72bce521e57092fe32aed9c28de9e9489a1df6a7d78e68b
Zenmap (Nmap) 7.70 Denial Of Service
Posted Sep 10, 2018
Authored by Gionathan Reale

Zenmap (Nmap) version 7.70 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 01480dbf49765ff3e98eebe7d3e0236de5b8c7e39187651526bae016912ba308
Out Of Band Exploitation (OOB) CheatSheet
Posted Sep 10, 2018
Authored by NotSoSecure

This whitepaper is an out of band exploitation cheatsheet.

tags | paper
SHA-256 | 13835c7d2fcf09e6205f8695749b87d837dab7fd2a69f065d8198f763f49f78b
Photo To Video Converter Professional 8.07 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Photo To Video Converter Professional version 8.07 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | de8c81394d6edaaa111b7d8b46761a4ae2b823e280981c03ff5911a886c2ed41
Flash Slideshow Maker Professional 5.20 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Flash Slideshow Maker Professional version 5.20 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 23b83555547e2be542a6d7a1b0cfa5dc11e4e94e240df915e76285f6b8a11b8a
Hypervisor From Scratch - Part 1: Basic Concepts And Configure Testing Environment
Posted Sep 10, 2018
Authored by Sinaei

This is the first part of a multi-part series of tutorials called "Hypervisor From Scratch". As the name implies, this course contains technical details to create a basic Virtual Machine based on hardware virtualization. If you follow the course, you will be able to create your own virtual environment and you will get an understanding of how VMWare, VirtualBox, KVM and other virtualization sores use processors' facilities to create a virtual environment.

tags | paper
SHA-256 | a32f09040ae82a277e8029a12b305598ed8004af1bdd6eb13d5088dcfbcdc946
How We Micropatched A Publicly Dropped 0day In Task Scheduler
Posted Sep 10, 2018
Authored by Mitja Kolsek

Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.

tags | paper
SHA-256 | deb36065ff9819bcfd1cef3afaa4a9f94c43d49d8869f350b053313e7ada99d6
Socusoft 3GP Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

Socusoft 3GP Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 4136726b78ce1dd6de5138d462721f59777c164a788f1672c3abe054142c8b6c
SocuSoft iPod Photo Slideshow 8.05 Buffer Overflow
Posted Sep 10, 2018
Authored by Shubham Singh

SocuSoft iPod Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 46ae09baf70aceffead1ce71535e9a43b089fade377c4452bececb2751c195bb
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close