exploit the possibilities
Showing 1 - 22 of 22 RSS Feed

Files Date: 2012-11-12

GNU Transport Layer Security Library 3.1.4
Posted Nov 12, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release includes initial support for the DTLS-SRTP protocol, updates related to the new DANE library, and several simplifications to the existing API.
tags | protocol, library
MD5 | 13901668735923add4470c33cb9d6298
Libgcrypt 1.5.0
Posted Nov 12, 2012
Authored by Werner Koch | Site gnu.org

Libgcrypt is a general-purpose cryptographic library based on the code from GnuPG. It provides functions for all cryptographic building blocks: symmetric ciphers (AES, DES, Blowfish, CAST5, Twofish, and Arcfour), hash algorithms (MD4, MD5, RIPE-MD160, SHA-1, and TIGER-192), MACs (HMAC for all hash algorithms), public key algorithms (RSA, ElGamal, and DSA), large integer functions, random numbers, and a lot of supporting functions.

Changes: This release added a new gcry_kdf_derive function implementing OpenPGP S2K algorithms and PBKDF2, support for Windows CE, support for ECDH, OAEP, and PSS methods (RFC 3447), new "%M" and "%u" format specifiers for gcry_sexp_build, and new functions that map ECC parameters to a curve name and parameter values. gcry_mpi_cmp when applied to opaque values now has a defined semantic. Intel AES-NI instructions are used if available. The module register subsystem has been deprecated. CTR mode may now be used with data chunks of arbitrary length. PKCS v1.5 code was fixed to always return the leading zero.
tags | library
systems | unix
MD5 | 78f8f8bec4580f75b25816f7896d0389
IDIC Blogs Shell Upload
Posted Nov 12, 2012
Authored by cr4wl3r

IDIC Blogs suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 1929d3ec65062fe1ccaae66fc45aee11
BananaDance Wiki b2.2 Cross Site Scripting / SQL Injection
Posted Nov 12, 2012
Authored by Katharina S.L. | Site vulnerability-lab.com

BananaDance Wiki version b2.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 2354f73163e559d5fd2160e89a3c853c
vBulletin vBay 11.9 SQL Injection
Posted Nov 12, 2012
Authored by Dan UK

vBulletin vBay versions 1.1.9 and below suffer from an error-based remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | bb8b5d8c0a09b990a7f6eba1def140e1
Smadav AntiVirus 9.1 Denial Of Service
Posted Nov 12, 2012
Authored by Mada R Perdhana

Smadav AntiVirus version 9.1 crash denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | cad6689bd009f1cb67454b9c632aadbf
Infin8 Shell Upload
Posted Nov 12, 2012
Authored by Net.W0lf, Hack Center Security Team

Sites designed by Infin8 suffer from a remote shell upload vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, shell
MD5 | 8e37d8f32b48a4260807debf29bee0d1
DNS 2 GeoIP
Posted Nov 12, 2012
Authored by Jethro Inwald

DNS 2 GeoIP is a simple python script that brute forces DNS and subsequently geolocates the found subdomains. It is useful for determining which services a company hosts off site or on site during a penetration test.

tags | tool, rootkit, python
systems | unix
MD5 | ca301b73c264bd6a88be0777bb0f19ed
Zoner Photo Studio 15 Build 3 Registry Value Parsing
Posted Nov 12, 2012
Authored by Julien Ahrens

Zoner Photo Studio version 15 build 3 (Zps.exe) registry value parsing local buffer overflow exploit.

tags | exploit, overflow, local, registry
MD5 | 25166c3e09fb9be29e776a0b29d11321
CKFinder 2.3 / FCKEditor 2.6.8 SWF Cross Site Scripting
Posted Nov 12, 2012
Authored by Soroush Dalili

CK Finder version 2.3 and FCKEditor version 2.6.8 allow uploads of malicious swf files that can allow for cross site scripting attacks.

tags | exploit, xss
MD5 | 2eda3301d34b7c61132c342d69a71c9b
Microsoft Visio 2010 Memory Corruption
Posted Nov 12, 2012
Authored by coolkaveh

Microsoft Viso 2010 memory corruption proof of concept exploit.

tags | exploit, proof of concept
systems | linux
MD5 | fd97b6a42ecfe55de1ebf80e4638b4c1
Secunia Security Advisory 51230
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Roundup, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 1df7655897c50d88a9aeea698acd7e7e
Secunia Security Advisory 51209
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Gajim, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 42e8254e1346b32ec1927cebf8dd5931
Secunia Security Advisory 51251
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for radsecproxy. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, debian
MD5 | 72aee23d65d923b817f1e634941b6f58
Secunia Security Advisory 51253
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ruby, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
MD5 | 207fbf87545257a1a65926c72d052f5f
Secunia Security Advisory 51231
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WeeChat, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 10864863b928217a6ce8e6360ac86196
Secunia Security Advisory 51224
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Ultimate TinyMCE plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 940091eb219462841ab03b9a67b83be8
Secunia Security Advisory 51256
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged multiple vulnerabilities in some Reflection products, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss
MD5 | 3198c6c03747f4045dcc53a35c9b6f76
Secunia Security Advisory 51276
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged a vulnerability in Reflection for Secure IT, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
MD5 | 68b7d6966c0c91a992be745d461aa7eb
Secunia Security Advisory 51262
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in esri ArcGIS, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 1de5e6f70287d7f86317d8b1c7702e4b
Secunia Security Advisory 51222
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cgit. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | 623a1cd8b328061f3a68f3911dd249db
Secunia Security Advisory 50976
Posted Nov 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the WP125 plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | d6efe56bfb3dea6dd8c55d943c8fef84
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close