what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2013-12-21

GNU Privacy Guard 1.4.16
Posted Dec 21, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: This release fixes the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. Also, by default only the major version number is printed on armored output, a trustdb file is not created when --ttrust-model=always is used, keyid for key packets are printed when --list-packets is used, and the modular exponentiation algorithm has been changed to recover from a small performance loss in version 1.4.1.
tags | tool, encryption
SHA-256 | 7b3b748e6aaa338092a0b26b1730cd9355765b55e3684f58dd70f9a1b00f4a2f
GNU Transport Layer Security Library 3.2.8
Posted Dec 21, 2013
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release fixes bugs, adds optimizations in the x86 and x86-64 CPU families, and adds some new features.
tags | protocol, library
SHA-256 | 144156f4140400df2bd9303dab69f44099113a3b46780737734affe93782d94d
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20121216
Posted Dec 21, 2013
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: Tor was updated to, libevent to 2.0.21, busybox to 1.21.1, and the kernel to 3.12.4 plus Gentoo's hardened-patches-3.12.4-1.extras. uClibc was kept at its latest release (, with some backported patches
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 959cce863a00d59947b3f0920aa7fe52197e1505633a41ecd523d2d51470dc8c
Leed Authentication Bypass, SQL Injection, CSRF
Posted Dec 21, 2013
Authored by Alexandre Herzog

Leed suffers from authentication bypass, cross site request forgery, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2013-2627, CVE-2013-2628, CVE-2013-2629
SHA-256 | 5d7cef70be868bc4ba37188215a7df2faffb093a6b4998f815979327d8478874
USP Secure Entry Server URL Redirection
Posted Dec 21, 2013
Authored by Alexandre Herzog | Site csnc.ch

USP Secure Entry Server suffers from a URL redirection vulnerability.

tags | exploit
advisories | CVE-2013-2764
SHA-256 | 995509d4226fbde7623bf7db3c4f9482a0db97f34ae2b2c1d1ded1f9c49e979b
Avast.com Cross Site Scripting
Posted Dec 21, 2013

Avast.com suffers from a cross site scripting vulnerability. This was sent to Packet Storm anonymously and was reported to the vendor. The vendor has not addressed the issue for months so it is being disclosed publicly in order to shed light on the issue.

tags | exploit, xss
SHA-256 | 1c3a06c072fae66bc640f5b7d482bbf52f72ae43fd03ae40a890739e3abdc7e3
Capstone 1.0
Posted Dec 21, 2013
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

tags | tool
systems | linux, unix
SHA-256 | 3fb3512b0476d03dcd1b347b0ff6b966216bf6d0158f79374aec4aa67cd30eca
Easy Karaoke Player 3.3.31 Integer Division By Zero
Posted Dec 21, 2013
Authored by Osanda Malith

Easy Karaoke Player version 3.3.31 integer division by zero exploit that creates a malicious wav file.

tags | exploit
SHA-256 | 6d06432f54e8ec7ac7db4d9cbb05a0800262ff09f5a802304ab7ffd7400318a2
Page 1 of 1

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By