what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2015-12-15 to 2015-12-16

Tor-ramdisk i686 UClibc-based Linux Distribution x86 20151215
Posted Dec 15, 2015
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: This release of tor-ramdisk switches from the tor-0.2.6 branch to the 0.2.7. This new branch depends on openssl’s elliptic curves code which is patented and can’t be distribute in tor-ramdisk. Luckily Gentoo has been working on porting over libressl as a drop in alternative to openssl.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 44d5890ff37dac7f469fbfe34c853afbb64a5853314c4f73d6c957f4c9b71441
Tequila File Hosting 1.5 Shell Upload
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | bfe8d1234300173f96675a71d46e4d5397e04506a211d7477770490d4aa61dd1
Tequila File Hosting 1.5 Cross Site Scripting
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 88e438d97852499ec115d2dd484e0d131f79b94ba3cc81ab4f0aa745638ac9be
Tequila File Hosting 1.5 Arbitrary File Download
Posted Dec 15, 2015
Authored by Ehsan Hosseini

Tequila File Hosting version 1.5 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | 94517623094566de5d1f9e9678eec971d63fcb6f124f128a12bd6df3728db8ad
PHPBack 1.1 Cross Site Scripting
Posted Dec 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

PHPBack version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cde593d1a57a48476453da138a2d1b632caff1e0b22e7d834c48c72ed75ed6c6
Red Hat Security Advisory 2015-2623-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2623-01 - The grub2 packages provide version 2 of the Grand Unified Bootloader, a highly configurable and customizable bootloader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2015-8370
SHA-256 | 8e513ad962a5579515fa94feef5b7b79b914a236728e2e466f4e3b28975c6563
Red Hat Security Advisory 2015-2622-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2622-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. The following security issue is addressed with this release: Satellite failed to properly enforce permissions on the show and destroy actions for reports. This could lead to an authenticated user with show and/or destroy report permissions being able to view and/or delete any reports held in Foreman.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5233
SHA-256 | 37726f4d7c569bc6b0535d1aa94f36f3860f443afea2a1ff3a9861996b0c4fbd
Ovidentia absences 2.64 Remote File Inclusion
Posted Dec 15, 2015
Authored by bd0rk

Ovidentia absences module version 2.64 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 3e97faf501f844d82f7e0f6e87e39a859ffefa40b3bee3552719f6f66341eadf
XRace Pro 1.0 SQL Injection
Posted Dec 15, 2015
Authored by indoushka

XRace Pro version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 1bc61a68b8d50c7561bfe95b08df9f72227897056a7e482e12a6e5e00a073385
Article Script 1.00 SQL Injection
Posted Dec 15, 2015
Authored by Linux Zone Research Team

Article Script version 1.00 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bf3bd34d21288950a7c224d3847770fa34fb396d9b671f982696bf25900cad0f
Ovidentia bulletindoc 2.9 Remote File Inclusion
Posted Dec 15, 2015
Authored by bd0rk

Ovidentia bulletindoc module version 2.9 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | a357e47a4cee21ba42b8dbdeabf267672c3475de3646cc944d8cbf3a3144a77f
MyBB 1.8.2 Code Execution
Posted Dec 15, 2015
Authored by Saeid Bostandoust

MyBB versions 1.8.2 and below reverse shell remote code execution exploit.

tags | exploit, remote, shell, code execution
SHA-256 | c7b673efcf8b3123fbfd25dffb1c266d5f7e31d87791c64b0ba51ffb88102c2b
Grub2 Authentication Bypass
Posted Dec 15, 2015
Authored by Hector Marco, Ismael Ripoll

Grub2 versions 1.98 through 2.02 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2015-8370
SHA-256 | 83bd7487636061aa2b0800d6365ebfbe91d7c0307ab06febcf641741b08068f4
WordPress Tierra Billboard Manager 1.14 SQL Injection
Posted Dec 15, 2015
Authored by Linux Zone Research Team

WordPress Tierra Billboard Manager plugin version 1.14 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d053f4c97a5d5fe4d4beb0d4590b24c61c2431802fe56a0f82a76334a609db44
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close