exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2017-10-27 to 2017-10-28

Lynis Auditing Tool 2.5.6
Posted Oct 27, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added additional keywords for banners. DirectAdmin extensions. Enhancements to process detection. Spanish translation extended. Extended HP-UX support. Only show relevant messages in report.
tags | tool, scanner
systems | unix
SHA-256 | 3eb0a3b43a90df850a2d6b8f0e3c633ae8995181e44f7e9ced5dff29c5f74c40
Hashcat Advanced Password Recovery 4.0.0 Source Code
Posted Oct 27, 2017
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

Changes: Added support to crack passwords and salts up to length 256. Added option --optimized-kernel-enable to use faster kernels but limit the maximum supported password- and salt-length. Added self-test functionality to detect broken OpenCL runtimes on startup. Various other additions.
tags | tool, cracker
systems | unix
SHA-256 | 9e8cb81bf26024eca2e117ddf8fd16316af3dd337ecf4e9917acbb1720c13b50
Hashcat Advanced Password Recovery 4.0.0 Binary Release
Posted Oct 27, 2017
Authored by Kartan | Site hashcat.net

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release..

Changes: Added support to crack passwords and salts up to length 256. Added option --optimized-kernel-enable to use faster kernels but limit the maximum supported password- and salt-length. Added self-test functionality to detect broken OpenCL runtimes on startup. Various other additions.
tags | tool, cracker
SHA-256 | 4717ee088a07e72857db1f9099cfe1ac72de4222e38b4a635e32a38b60fa6d93
PHP 4.2.0 / 4.2.1 Remote Compromise / Denial Of Service
Posted Oct 27, 2017
Authored by Stefan Esser

PHP versions 4.2.0 and 4.2.1 suffer from an issue where depending on the processor architecture it may be possible for a remote attacker to either crash or compromise the web server.

tags | advisory, remote, web, denial of service, php
SHA-256 | a79bf56468ece73d79827db39c362a796db5dc8b60b2c782645b659672ab1f6b
RSA Authentication Manager 8.2 SP1 P4 Cross Site Scripting
Posted Oct 27, 2017
Site emc.com

RSA Authentication Manager version 8.2 SP1 Patch 5 contains a fix for a reflected cross site scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system.

tags | advisory, xss
advisories | CVE-2017-14373
SHA-256 | 5b5645bda0f2b625a651131b4ff3abe2b01954d607cc2e4a1dd37367741a4bb6
Android Private Internet Access Denial Of Service
Posted Oct 27, 2017
Authored by Yakov Shafranovich | Site wwws.nightwatchcybersecurity.com

The Android application provided by Private Internet Access (PIA) VPN service can be crashed by downloading a large file containing a list of current VPN servers. This can be exploited by an MITM attacker via intercepting and replacing this file. While the file is digitally signed, it is not served over SSL and the application did not contain logic for checking if the provided file is very large. The vendor has fixed this issue in version 1.3.3.1 and users should install the latest version.

tags | exploit, denial of service
advisories | CVE-2017-15882
SHA-256 | 800f549876739334d620586c15f309262e80b5ce74344d37893a980b9345e1e9
Tizen Studio 1.3 Smart Development Bridge Buffer Overflow
Posted Oct 27, 2017
Authored by Marcin Kopec

Tizen Studio version 1.3 Smart Development Bridge versions prior to 2.3.2 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 76ab0e7b1cd5ce678ed34550ad310cb3fc9e701de65057b5d08d1ee84d2300ff
DameWare Remote Controller 12.0.0.520 Remote Code Execution
Posted Oct 27, 2017
Authored by Securifera

DameWare Remote Controller versions 12.0.0.520 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2016-2345
SHA-256 | 4a4c9ff1d9e13aeac05d41ef0fa4e98e4a4c365f635327661de001c1432585c0
Watchdog Development Anti-Malware / Online Security Pro NULL Pointer Dereference
Posted Oct 27, 2017
Authored by Parvez Anwar

Watchdog Development Anti-Malware / Online Security Pro version 2.74.186.150 suffers from a NULL pointer dereference vulnerability.

tags | exploit
advisories | CVE-2017-15920, CVE-2017-15921
SHA-256 | 1d1aa46aa3dffca08ad0ae09b967754548443a2f89a9b0f56ed5e4412201f732
Windows Attachment Manager Incorrect High Risk JAR Handling
Posted Oct 27, 2017
Authored by Stevie Lamb

The Windows Attachment Manager does not correctly handle JAR files marked as high risk when accessed via Internet Explorer 11.

tags | advisory
systems | windows
SHA-256 | 55d6f4555285c911f938d1c94208c74030f6f4131f6a8f5b3412527ade760885
Bamboo 6.x Remote Code Execution
Posted Oct 27, 2017
Authored by Atlassian

Bamboo versions prior to 6.0.5, 6.1.4, and 6.2.1 suffer from a code execution vulnerability.

tags | advisory, code execution
advisories | CVE-2017-9514
SHA-256 | 5122ff868395313b4aefc08b694740acaba7c14260c3145f90403015f091520e
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close