exploit the possibilities
Showing 1 - 25 of 45 RSS Feed

Files Date: 2010-08-31

Botan C++ Crypto Algorithms Library 1.8.10
Posted Aug 31, 2010
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release makes a slight change to how AES is implemented, which makes some forms of cache analysis attacks significantly harder. The default algorithm used for encrypting private keys has changed from 3DES to AES-256, and the default iteration count used for hashing passwords to keys has increased from 2048 to 10000 iterations. Some changes for compatibility with the 1.9 development releases were also made.
tags | library
MD5 | 9f169ee5921a89260c71a208b0481b5c
Debian Linux Security Advisory 2101-1
Posted Aug 31, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2101-1 - Several implementation errors in the dissector of the Wireshark network traffic analyzer for the ASN.1 BER protocol and in the SigComp Universal Decompressor Virtual Machine may lead to the execution of arbitrary code.

tags | advisory, arbitrary, protocol
systems | linux, debian
advisories | CVE-2010-2994, CVE-2010-2995
MD5 | 9e4517c5c11a2c8679174a546d3783a4
CartXpress Backup Related / File Disclosure / Shell Upload
Posted Aug 31, 2010
Authored by indoushka

CartXpress suffers from backup related, file disclosure and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, info disclosure
MD5 | d0cde3459bec460f5333b1b809fff27d
ApPHP Cross Site Request Forgery / Cross Site Scripting
Posted Aug 31, 2010
Authored by Edgard Chammas

ApPHP suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, csrf
MD5 | 98d1db1212daa5664ef8d0e3227ebf09
KeePass Password Safe 2.12 DLL Hijack
Posted Aug 31, 2010
Authored by Aung Khant | Site yehg.net

KeePass Password Safe versions 2.12 and below suffer from a DLL hijacking vulnerability.

tags | exploit
MD5 | 4df8443bd6e31f1e8500adef4f594bb2
WordPress 3.0.1 URL Redirection
Posted Aug 31, 2010
Authored by ItSecTeam

WordPress versions 3.0.1 and below suffer from an URL redirection bug.

tags | exploit
MD5 | e65e12163ee044a64fbf4b4115b4c734
HP Security Bulletin HPSBMA02571 SSRT100034
Posted Aug 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Insight Diagnostics Online Edition running on Linux. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

tags | advisory, xss
systems | linux
advisories | CVE-2010-3003
MD5 | 4e1948b4fa0864277f76dc2ab1b3e3e0
Tortoise SVN DLL Hijacking
Posted Aug 31, 2010
Authored by Nikhil Mittal

Tortoise SVN version 1.6.10 build 19898 suffers from the Windows DLL hijacking vulnerability.

tags | advisory
systems | windows
advisories | CVE-2010-3199
MD5 | 18c757c53461202273321eb91c9e2d09
Zero Day Initiative Advisory 10-168
Posted Aug 31, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-168 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the QTPlugin.ocx ActiveX control. The plugin accepts a parameter named _Marshaled_pUnk that it uses as a valid pointer. By specifying invalid values an attacker can force the application to jump to a controlled location in memory. This can be exploited to execute remote code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary, activex
systems | apple
MD5 | f1e202e02d5bb2b6edce390377069eac
Mandriva Linux Security Advisory 2010-166
Posted Aug 31, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-166 - Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-1526
MD5 | 74a5e32dcc8de585e13eaffbfbd944b5
Web-Ideas Web Shop Standard SQL Injection
Posted Aug 31, 2010
Authored by Ariko-Security

Web-Ideas Web Shop Standard suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | 8b0ebafe552baf5accfa95d7cbe31b57
NING Application Self Replicating Malware
Posted Aug 31, 2010
Authored by James Bercegay

This is a proof of concept, self replicating, social network based malware for NING.

tags | exploit, proof of concept
MD5 | 5a18d712327fbb7191111ebeddc05e49
Ubuntu Security Notice 981-1
Posted Aug 31, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 981-1 - It was discovered that libwww-perl incorrectly filtered filenames suggested by Content-Disposition headers. If a user were tricked into downloading a file from a malicious site, a remote attacker could overwrite hidden files in the user's directory.

tags | advisory, remote, perl
systems | linux, ubuntu
advisories | CVE-2010-2253
MD5 | 1b6f8fba75621cbb77aeb7061fc7668c
Joomla JE FAQ Pro Blind SQL Injection
Posted Aug 31, 2010
Authored by Chip D3 Bi0s

The Joomla JE FAQ component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 1197b45ece79014db6580ecc0355c99b
Ubuntu Security Notice 980-1
Posted Aug 31, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 980-1 - Julius Plenz discovered that bogofilter incorrectly handled certain malformed encodings. By sending a specially crafted email, a remote attacker could exploit this and cause bogofilter to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-2494
MD5 | 3e230abdd37c42ca6371757ffe07ce1b
Void SSH Brute Forcing Script
Posted Aug 31, 2010
Authored by 5ynL0rd | Site voidnetwork.org

Void SSH is a python script that performs multithreaded bruteforcing.

tags | cracker, python
MD5 | 5cb7c40c585e98516de99556d2eea61f
Joomla PicSell Local File Disclosure
Posted Aug 31, 2010
Authored by Craw

The Joomla PicSell component suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 1237cdeb9b8aad75ee580ced114fd4ee
HP Security Bulletin HPSBUX02552 SSRT100062
Posted Aug 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Software Distributor (sd). The vulnerability could be exploited locally to grant an increase in privilege, or to permit unauthorized access.

tags | advisory
systems | hpux
advisories | CVE-2010-2712
MD5 | acc794ce0bdf65f028c00b56a9387ca4
Secunia Security Advisory 41243
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IsoBuster, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 557c6046bb87050e35e059e42f3f80bc
Secunia Security Advisory 41251
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/ServerConductor/Control Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 4293826166e675dae90701876ce564b6
Secunia Security Advisory 41209
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Sophos Free Encryption, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | d93e5349909dda04d62452bcfc3d7c08
Secunia Security Advisory 41252
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi Cosminexus products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | d7f5cc31be6341b6e98bbea4e42c0365
Secunia Security Advisory 41250
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in JP1/Automatic Job Management System, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 9cacace6bc3eab2064a521cf7b11a329
Secunia Security Advisory 41248
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/Integrated Management, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 671b9618787e45cf72ec301c0d7f5abc
Secunia Security Advisory 41249
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/Performance Management, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 838680f29e09941a2ca09e5e253751d3
Page 1 of 2
Back12Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    16 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close