exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2011-03-21

Botan C++ Crypto Algorithms Library 1.9.15
Posted Mar 21, 2011
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: A modification to the SHA-2 message expansion results in a 5% to 20% performance improvement in SHA-256 and SHA-512 on x86-64. A bug that would cause a crash on OpenBSD on SPARC has been fixed. The build system is better at configuring for ARM builds. This is the first release candidate for the next stable branch.
tags | library
systems | linux
SHA-256 | 42515affc73f5c469a33af81dd25de7146d8ac9142dd6b95bd411920755f9c42
Mediacoder 2011 RC3 Buffer Overflow
Posted Mar 21, 2011
Authored by Oh Yaw Theng

Mediacoder version 2011 RC3 buffer overflow exploit that creates a malicious .m3u file that will bind a shell to port 5555.

tags | exploit, overflow, shell
SHA-256 | fbcfe46b0a318078d0ab2439fb9b3f1409a159f850153dd356d7f45ce5fa09a1
MPlayer Lite r33064 SEH Overflow
Posted Mar 21, 2011
Authored by C4SS!0 G0M3S, h1ch4m

MPlayer Lite version r33064 SEH overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | 1b55c647e927e0bd6d1bece8906a4764a929fe79d2028a5ddd7c87dfd0ee488a
Online Store PHP Script By Goran Cross Site Scripting
Posted Mar 21, 2011
Authored by kurdish hackers team | Site kurdteam.org

Online Store PHP Script By Goran suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 31c65dc883e4f6e15ca7d000dc9a50bf9aa584c03987673babe9acf736514d77
Online Store PHP Script By Goran SQL Injection
Posted Mar 21, 2011
Authored by kurdish hackers team | Site kurdteam.org

Online Store PHP Script By Goran suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 94fcbb9b89cd04d9c9ddf2dd3d8ede1d25738518947fd5bada908f7116181511
WebFly CMS SQL Injection
Posted Mar 21, 2011
Authored by MasterGipy

WebFly CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d3ede83184b80b2fe65b6978cce8eeac4aa4fb33be3ad77535f461e0d84d5492
FactoryLink / Iconics GENESIS32/64 / IGSS / RealWin SCADA Issues
Posted Mar 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

A very large amount of vulnerabilities have been discovered in multiple SCADA systems. These ranges from buffer overflows to denial of service to directory traversal issues and more. Systems affected include Siemens Tecnomatix FactoryLink, Iconics GENESIS32 / GENESIS64, 7-Technologies IGSS, and DATAC RealWin. Included are 34 advisories and related proof of concepts.

tags | exploit, denial of service, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | 8bd14c7eed99151c80ec9a25811b7e674194f88dc2e6c43bad5c81eaef69fdcd
RealPlayer 14.0.1.633 Heap Overflow
Posted Mar 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

RealPlayer versions 14.0.1.633 and below suffers from a heap overflow during the handling of IVR files. This is caused by the allocation of a certain amount of data (frame size) decided by the attacker and the copying of another arbitrary amount on the same buffer. Proof of concept exploit included.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux
SHA-256 | 6e595a81866c87dd6d9792d4d8aed66218fd680ae847cde3941f629d9ad64923
Mandriva Linux Security Advisory 2011-051
Posted Mar 21, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-051 - The Linux 2.6 kernel has been updated to mitigate multiple vulnerabilities related to denial of service, arbitrary code execution, stack memory disclosure, restriction bypass, and more.

tags | advisory, denial of service, arbitrary, kernel, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2010-2240, CVE-2010-4165, CVE-2010-4072, CVE-2010-4073, CVE-2010-4083, CVE-2010-4078, CVE-2010-3297, CVE-2010-3437, CVE-2010-2946, CVE-2010-3310, CVE-2010-3067, CVE-2010-0007, CVE-2010-3875, CVE-2010-2248, CVE-2009-1895, CVE-2009-2768, CVE-2009-3726, CVE-2009-2698, CVE-2009-3080, CVE-2010-2521, CVE-2007-1592, CVE-2010-3850
SHA-256 | 4cde969b4cdb9c88d249a1bc077eb95b786a6396542e2655f3fdef84c6102638
Debian Security Advisory 2197-1
Posted Mar 21, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2197-1 - It has been discovered that the Quagga routing daemon contains two denial-of-service vulnerabilities in its BGP implementation. A crafted Extended Communities attribute triggers a null pointer dereference which causes the BGP daemon to crash. The BGP daemon resets BGP sessions when it encounters malformed AS_PATHLIMIT attributes, introducing a distributed BGP session reset vulnerability which disrupts packet forwarding.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-1674, CVE-2010-1675
SHA-256 | 7b7212876c0dc85a313a39760b58246048b833cdff698a6fde7789df6595bc40
Mandriva Linux Security Advisory 2011-050
Posted Mar 21, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-050 - It was discovered that libpurple versions prior to 2.7.10 do not properly clear certain data structures used in libpurple/cipher.c prior to freeing. An attacker could potentially extract partial information from memory regions freed by libpurple. The Yahoo protocol plugin in libpurple versions 2.6.0 through 2.7.10 do not properly handle malformed YMSG packets, leading to NULL pointer dereferences and application crash.

tags | advisory, protocol
systems | linux, mandriva
advisories | CVE-2011-1091
SHA-256 | 6946f9cf77da9559208045f1b25444c5b5032dbb9a51384c41139be8a379b5d6
Imagemagick 6.6.8-5 Stack Overflow
Posted Mar 21, 2011
Authored by zgmzgm

Imagemagick version 6.6.8-5 with Libtiff version 6.9.4 appears to suffer from a buffer overflow vulnerability. Proof of concept .tif enclosed.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 89d1bd335b330f97e026b62da3a2f55786503c0641f0c62ef60030e8fce38301
Mandriva Linux Security Advisory 2011-049
Posted Mar 21, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-049 - The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2011-0762
SHA-256 | c08705321456654fe5a1918b154688cec58d91991fae2c1710c2faa6478ac2cb
Multi Threaded TCP Port Scanner 1.3
Posted Mar 21, 2011
Authored by SecPoint | Site secpoint.com

This is a basic TCP SYN scanner that is multi-threaded.

Changes: Added more default ports.
tags | tool, scanner, tcp
systems | unix
SHA-256 | 768c595fba7ba7e81da35e1bba1118bf08a1d689c6e419804d2109fc64177436
CMS Lokomedia 1.5 Shell Upload
Posted Mar 21, 2011
Authored by eidelweiss

CMS Lokomedia version 1.5 suffers from remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 9887ba2dae5c855c073b17ee313676904ca193aba34b95b95ea07aa798342653
Douran Portal 3.9.7.8 File Disclosure
Posted Mar 21, 2011
Authored by Soroush Dalili, HUrr!c4nE!

Douran Portal version 3.9.7.8 suffers from a file download / source code disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 05de5c3083ad1234fda02cbcc818d3263aeb88c4dea387ee5fc84d20f85ef3f7
MobiPST 2011 Call For Papers
Posted Mar 21, 2011
Site ocu-stars.okcu.edu

Call For Papers for MobiPST 2011 - The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011) will be held in conjunction with the 20th International Conference on Computer Communications and Networks (ICCCN 2011), in Maui, Hawaii, USA. All papers presented in MobiPST 2011 will be published in the workshop proceedings.

tags | paper, conference
SHA-256 | ce0868ee6c6cc6ab14250d5ab7660132f5c0f37dfd0a2a4ca779a2e8b7f40feb
Brief Whitepaper On Risk Management
Posted Mar 21, 2011
Authored by Cygog

This is a brief whitepaper detailing risk management, or Gestion De Riesgos. Written in Spanish.

tags | paper
SHA-256 | f789c890534783007f92e8397c0db8825e91423bc0e8fd272df2b9b182ddb4c7
Debian Security Advisory 2196-1
Posted Mar 21, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2196-1 - Witold Baryluk discovered that MaraDNS, a simple security-focused Domain Name Service server, may overflow an internal buffer when handling requests with a large number of labels, causing a server crash and the consequent denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2011-0520
SHA-256 | d49aefc27dfbbe7942488de6cb7354b601d73d5e01aa2c45b7d3956fb795753c
Debian Security Advisory 2195-1
Posted Mar 21, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2195-1 - Stephane Chazelas discovered that the cronjob of the PHP 5 package in Debian suffers from a race condition which might be used to remove arbitrary files from a system (CVE-2011-0441).

tags | advisory, arbitrary, php
systems | linux, debian
advisories | CVE-2011-0441, CVE-2010-3709, CVE-2010-3710, CVE-2010-3870, CVE-2010-4150
SHA-256 | 8c976ecd8159b97b81ceda7096250bcdba228218460a2b386797c24f18912b61
Audio Editor Pro 5.0 Buffer Overflow
Posted Mar 21, 2011
Authored by anT!-Tr0J4n

Audio Editor Pro version 5.0 local buffer overflow proof of concept exploit that creates a malicious .ogg file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 661b6f80b89a5b345ac887e570db5d5f0a9ce5462c163383c42b9fbfce56c724
Web Poll Pro 1.0.3 Cross Site Scripting
Posted Mar 21, 2011
Authored by Hector.x90

Web Poll Pro version 1.0.3 suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | f8fe190fe04cc434abcaf1a0cf5c5ac8f54d44612355e537500815c167c71fd7
Secunia Security Advisory 43828
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Xr0b0t has discovered a vulnerability in Kleophatra CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6b421d56b5d730aab96073898480ed380b39314e7c48b8f915d98f5d0a879b5b
Secunia Security Advisory 43805
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Xoops, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d256f78d521d1bfdc25cd970a62d8acf5266050e53ccc6fec7480e6a18846432
Secunia Security Advisory 43557
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba3x. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious users to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, local
systems | linux, redhat
SHA-256 | fa854108bc3e49d9803baaafed24cf2becf4acaf1086c1e66d79398bd0c38e67
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close