exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2016-01-31

I2P 0.9.24
Posted Jan 31, 2016
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
SHA-256 | 134481ae5ef934a411545330d1b22e768189c424a65db47058db0f7d9cf51e7d
360-FAAR Firewall Analysis Audit And Repair 0.5.4
Posted Jan 31, 2016
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release updates the 'loose' and 'loosen' filters so that 'include' filters work the same as 'exclude' filters did. This release also updates the Netscreen Parser so that it reads lines with spaces at the beginning.
tags | tool, perl
systems | unix
SHA-256 | e08e2af42535cd28422b0683f922dda1c5aa25589d440e7d865f107997dda95e
Hippo CMS 10.1 XML External Entity Information Disclosure
Posted Jan 31, 2016
Authored by LiquidWorm | Site zeroscience.mk

Hippo CMS version 10.1 suffers from an XML External Entity information disclosure vulnerability.

tags | exploit, info disclosure, xxe
SHA-256 | c467cf5987ff04b0981c61e79fceeeafe5e7597ea26c5cfec1e21868b1dd6c71
Hippo CMS 10.1 Stored Cross Site Scripting
Posted Jan 31, 2016
Authored by LiquidWorm | Site zeroscience.mk

Hippo CMS version 10.1 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | baa214cc3d18abc9c36401bb6549b75564476366c5d76e56472cf63f81e56474
FreeBSD Security Advisory - FreeBSD-SA-16:11.openssl
Posted Jan 31, 2016
Site security.freebsd.org

FreeBSD Security Advisory - A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. An active MITM attacker may be able to force a protocol downgrade to SSLv2, which is a flawed protocol and intercept the communication between client and server.

tags | advisory, protocol
systems | freebsd
advisories | CVE-2015-3197
SHA-256 | 827e9ad8f6704f864f01a7b83b9a552d36a3e9f6236faf2b0176021619eee998
VBScan Vulnerability Scanner 0.1.4
Posted Jan 31, 2016
Authored by Mohammad Reza Espargham

VBScan is a black box vBulletin vulnerability scanner written in perl.

Changes: New engine, default timeout, 5.x RCE exploit, and text report output. Various bug fixes.
tags | tool, scanner, perl
systems | unix
SHA-256 | 50b8c3cf5f0259a2730560b37dcd93d7b6a81dd0fe12fb9e513ed77090111d08
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close