exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 45 RSS Feed

Files Date: 2010-08-31

Botan C++ Crypto Algorithms Library 1.8.10
Posted Aug 31, 2010
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release makes a slight change to how AES is implemented, which makes some forms of cache analysis attacks significantly harder. The default algorithm used for encrypting private keys has changed from 3DES to AES-256, and the default iteration count used for hashing passwords to keys has increased from 2048 to 10000 iterations. Some changes for compatibility with the 1.9 development releases were also made.
tags | library
SHA-256 | d35a1edffeca94ff6560ac0e54c9f1711480f7f66e7e975a5d614802c1e8b860
Debian Linux Security Advisory 2101-1
Posted Aug 31, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2101-1 - Several implementation errors in the dissector of the Wireshark network traffic analyzer for the ASN.1 BER protocol and in the SigComp Universal Decompressor Virtual Machine may lead to the execution of arbitrary code.

tags | advisory, arbitrary, protocol
systems | linux, debian
advisories | CVE-2010-2994, CVE-2010-2995
SHA-256 | 7b2f15fdc7ec4db2d2bddda503707a4fbc9e81e6fbf9ccbdbd7f4c19c3f8153c
CartXpress Backup Related / File Disclosure / Shell Upload
Posted Aug 31, 2010
Authored by indoushka

CartXpress suffers from backup related, file disclosure and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, info disclosure
SHA-256 | 6637f55bc566c82cf16fdfe5d5f556388117dfbb01841d832ef2393d72936653
ApPHP Cross Site Request Forgery / Cross Site Scripting
Posted Aug 31, 2010
Authored by Edgard Chammas

ApPHP suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, csrf
SHA-256 | f52896eb27b251c1dc181712235f36f1f9af72d5e3c6d9587b1d1fa902df67d9
KeePass Password Safe 2.12 DLL Hijack
Posted Aug 31, 2010
Authored by Aung Khant | Site yehg.net

KeePass Password Safe versions 2.12 and below suffer from a DLL hijacking vulnerability.

tags | exploit
SHA-256 | 27dbb2d7b1a90d919e1bb2569728ac3730bb4f93303001bce971cda7b0ccb700
WordPress 3.0.1 URL Redirection
Posted Aug 31, 2010
Authored by ItSecTeam

WordPress versions 3.0.1 and below suffer from an URL redirection bug.

tags | exploit
SHA-256 | 818645c1e23f450fea6cea2660c625b0ff9c7478a484a12a6949d2fed28619ca
HP Security Bulletin HPSBMA02571 SSRT100034
Posted Aug 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Insight Diagnostics Online Edition running on Linux. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

tags | advisory, xss
systems | linux
advisories | CVE-2010-3003
SHA-256 | c69549e0024fc2ad6f619ff0c4de6ae67da996928c1ab724182981d7ab8df1ad
Tortoise SVN DLL Hijacking
Posted Aug 31, 2010
Authored by Nikhil Mittal

Tortoise SVN version 1.6.10 build 19898 suffers from the Windows DLL hijacking vulnerability.

tags | advisory
systems | windows
advisories | CVE-2010-3199
SHA-256 | 9e458041f1e779bd80016839b2909b4a95fedd5e4ffd1c4e4b05752f80456ce3
Zero Day Initiative Advisory 10-168
Posted Aug 31, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-168 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the QTPlugin.ocx ActiveX control. The plugin accepts a parameter named _Marshaled_pUnk that it uses as a valid pointer. By specifying invalid values an attacker can force the application to jump to a controlled location in memory. This can be exploited to execute remote code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary, activex
systems | apple
SHA-256 | 631cc7b0c010057230df142d3e530164f8b056bc448189e6d055b37b81eb3f93
Mandriva Linux Security Advisory 2010-166
Posted Aug 31, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-166 - Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-1526
SHA-256 | da5ff90119d40112c96082889fb4d03c8984033ade5e99468d5e144613f8a459
Web-Ideas Web Shop Standard SQL Injection
Posted Aug 31, 2010
Authored by Ariko-Security

Web-Ideas Web Shop Standard suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | a7651507829dd54dda9a367e89e65463d9f40142716e22b30a0fb2b5bb26f1ea
NING Application Self Replicating Malware
Posted Aug 31, 2010
Authored by James Bercegay

This is a proof of concept, self replicating, social network based malware for NING.

tags | exploit, proof of concept
SHA-256 | de4f62f605510fd85d965fa28f6ecc9117079527689671ded2199c9061472bc2
Ubuntu Security Notice 981-1
Posted Aug 31, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 981-1 - It was discovered that libwww-perl incorrectly filtered filenames suggested by Content-Disposition headers. If a user were tricked into downloading a file from a malicious site, a remote attacker could overwrite hidden files in the user's directory.

tags | advisory, remote, perl
systems | linux, ubuntu
advisories | CVE-2010-2253
SHA-256 | c075eb9f7a7aa39e64016a87bd6f0e1be9762ecd2feaed17a9615c6901713fe9
Joomla JE FAQ Pro Blind SQL Injection
Posted Aug 31, 2010
Authored by Chip D3 Bi0s

The Joomla JE FAQ component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4efb76783508ae2e5fc5547ba2be6993b0fda4cf388672d0f263879086b9b54e
Ubuntu Security Notice 980-1
Posted Aug 31, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 980-1 - Julius Plenz discovered that bogofilter incorrectly handled certain malformed encodings. By sending a specially crafted email, a remote attacker could exploit this and cause bogofilter to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-2494
SHA-256 | c1f2f49d09fc41d4668cc934226fc360b15c361f48bd0194871e001339bc15e1
Void SSH Brute Forcing Script
Posted Aug 31, 2010
Authored by 5ynL0rd | Site voidnetwork.org

Void SSH is a python script that performs multithreaded bruteforcing.

tags | cracker, python
SHA-256 | 4b537bed529692e7a377f1559b3cb1255c25773329e525eaeda49f0a6e0e97d7
Joomla PicSell Local File Disclosure
Posted Aug 31, 2010
Authored by Craw

The Joomla PicSell component suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | f104f0432e062b97ccdee2889a6ae50f8dda7b11c4129f72b9758f7561add987
HP Security Bulletin HPSBUX02552 SSRT100062
Posted Aug 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Software Distributor (sd). The vulnerability could be exploited locally to grant an increase in privilege, or to permit unauthorized access.

tags | advisory
systems | hpux
advisories | CVE-2010-2712
SHA-256 | d3fd0a88a0f935a023804bb9df9f956436d99484cca1fc0cb4af711916d5bedf
Secunia Security Advisory 41243
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IsoBuster, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 7229004902c7043919f9d1812c5cdb3525b7e834ae312949eadc001535260dd3
Secunia Security Advisory 41251
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/ServerConductor/Control Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 1dd802509a8f48504b0f623d723b01008ac74be7050a8596603764e2f34bf9b7
Secunia Security Advisory 41209
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Sophos Free Encryption, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | da2f67cf4661c920b1087bf646af383301024c93ebddf3f1035fdf8267ad0a87
Secunia Security Advisory 41252
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi Cosminexus products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | fc2a23d8c3302cc04410afba93fc5755a3755e6891848d52e8fec706f4b7e907
Secunia Security Advisory 41250
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in JP1/Automatic Job Management System, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d7878d2fca1c457cbffe0d1664b5ce9b6c1c645a4d594c2b3f5419aa86d3d5b5
Secunia Security Advisory 41248
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/Integrated Management, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ad6e8e80a3f89ec3cc896e8a11aa4f0aa46fcf6fe9e9f72093d0654575c824d0
Secunia Security Advisory 41249
Posted Aug 31, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/Performance Management, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | a22671b8014ab87fe8b92197375ba325ac645524a29f7d2a2f79eaee29f42882
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close