exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2013-12-27

FireHOL 1.297
Posted Dec 27, 2013
Authored by Costa Tsaousis | Site firehol.org

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Removed adsense from offline manual pages. Fixed permissions on a couple of examples.
tags | tool, spoof, firewall
systems | linux, unix
SHA-256 | 37f1e7d5c241a3f4ce1e796eaace4f02f1908548c3c42a44f902f0ad2c67cf30
Snapchat Crypto Flaws
Posted Dec 27, 2013
Authored by GibsonSec | Site gibsonsec.org

As prior disclosure to Snapchat has not resulted in fixes, the researchers at Gibson Security have released exploits and documentation on the previously undocumented API.

tags | exploit
SHA-256 | fac0b4639306a9c24f63349abdcdd3a9a44619200b2d4d71132244cce7879d9b
ipset_list 2.9.1
Posted Dec 27, 2013
Authored by AllKind | Site sourceforge.net

ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. Optionally, the output can be colorized.

Changes: This release fixes a small bug in the help synopsis. The -Oi option was not shown for the -i option.
tags | tool, firewall
systems | linux, unix
SHA-256 | 3317782f2ed93f994a6fd03ed831a7bac730972a59fc5d84944923207d06687b
IBM Web Content Manager XPath Injection
Posted Dec 27, 2013
Authored by Alexander Antukh, S. Temnikov | Site sec-consult.com

IBM Web Content Manager versions 6.x, 7.x, and 8.x suffer from blind XPath injection attacks. This allows an attacker to get current application configuration, enumerate nodes, and extract other valuable information from vulnerable installations of Web Content Manager.

tags | exploit, web
advisories | CVE-2013-6735
SHA-256 | 69ed54de30dd34415932f287057413898bcb590a08bf4420d7b20ebaa5b7b2aa
Red Hat CloudForms Management Engine 5.1 miq_policy/explorer SQL Injection
Posted Dec 27, 2013
Authored by Ramon de C Valle | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability in the "explorer" action of "miq_policy" controller of the Red Hat CloudForms Management Engine 5.1 (ManageIQ Enterprise Virtualization Manager 5.0 and earlier) by changing the password of the target account to the specified password.

tags | exploit, sql injection
systems | linux, redhat
advisories | CVE-2013-2050
SHA-256 | b55583d572b94d5be808ddfcb5ca09620c6e831caa6772d47ef4ca397a0d8dfc
Safari Phishing Alert Bypass
Posted Dec 27, 2013
Authored by WooYun

The PhishingAlert of Safari stops functioning in Windows systems if an abnormal URL is being used.

tags | exploit
systems | windows
SHA-256 | 79d05414fca80bf21d6c2eb1c842e21bb4fd3ab573ff1e90f90b60fa32541ebb
AWS Elastic Beanstalk Code Execution
Posted Dec 27, 2013
Authored by WooYun

Amazon Web Services Elastic Beanstalk suffers from a code execution vulnerability.

tags | exploit, web, code execution
SHA-256 | 9627d5239332fca927a6137f308067102214ba471ccb72e6c5da1b446bc2f5dc
PHPSurveyor Shell Upload
Posted Dec 27, 2013
Authored by G4eL

PHPSurveyor suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1ae2be6659eceab6f2fe08517e7d5ee0c444690d71d791f904fc264c5ccdc978
Ofilter Player 1.1 Integer Division By Zero
Posted Dec 27, 2013
Authored by Osanda Malith

Ofilter Player version 1.1 integer division by zero exploit that creates a malicious .wav file.

tags | exploit
SHA-256 | 82448eb9a0eb3e37a6df8d7c7ac93b3401c0c63f6d2f2ebbad44bb6503c592cc
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close