what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2013-12-21

GNU Privacy Guard 1.4.16
Posted Dec 21, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: This release fixes the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. Also, by default only the major version number is printed on armored output, a trustdb file is not created when --ttrust-model=always is used, keyid for key packets are printed when --list-packets is used, and the modular exponentiation algorithm has been changed to recover from a small performance loss in version 1.4.1.
tags | tool, encryption
SHA-256 | 7b3b748e6aaa338092a0b26b1730cd9355765b55e3684f58dd70f9a1b00f4a2f
GNU Transport Layer Security Library 3.2.8
Posted Dec 21, 2013
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release fixes bugs, adds optimizations in the x86 and x86-64 CPU families, and adds some new features.
tags | protocol, library
SHA-256 | 144156f4140400df2bd9303dab69f44099113a3b46780737734affe93782d94d
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20121216
Posted Dec 21, 2013
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: Tor was updated to 0.2.4.19, libevent to 2.0.21, busybox to 1.21.1, and the kernel to 3.12.4 plus Gentoo's hardened-patches-3.12.4-1.extras. uClibc was kept at its latest release (0.9.33.2), with some backported patches
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 959cce863a00d59947b3f0920aa7fe52197e1505633a41ecd523d2d51470dc8c
Leed Authentication Bypass, SQL Injection, CSRF
Posted Dec 21, 2013
Authored by Alexandre Herzog

Leed suffers from authentication bypass, cross site request forgery, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2013-2627, CVE-2013-2628, CVE-2013-2629
SHA-256 | 5d7cef70be868bc4ba37188215a7df2faffb093a6b4998f815979327d8478874
USP Secure Entry Server URL Redirection
Posted Dec 21, 2013
Authored by Alexandre Herzog | Site csnc.ch

USP Secure Entry Server suffers from a URL redirection vulnerability.

tags | exploit
advisories | CVE-2013-2764
SHA-256 | 995509d4226fbde7623bf7db3c4f9482a0db97f34ae2b2c1d1ded1f9c49e979b
Avast.com Cross Site Scripting
Posted Dec 21, 2013

Avast.com suffers from a cross site scripting vulnerability. This was sent to Packet Storm anonymously and was reported to the vendor. The vendor has not addressed the issue for months so it is being disclosed publicly in order to shed light on the issue.

tags | exploit, xss
SHA-256 | 1c3a06c072fae66bc640f5b7d482bbf52f72ae43fd03ae40a890739e3abdc7e3
Capstone 1.0
Posted Dec 21, 2013
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

tags | tool
systems | linux, unix
SHA-256 | 3fb3512b0476d03dcd1b347b0ff6b966216bf6d0158f79374aec4aa67cd30eca
Easy Karaoke Player 3.3.31 Integer Division By Zero
Posted Dec 21, 2013
Authored by Osanda Malith

Easy Karaoke Player version 3.3.31 integer division by zero exploit that creates a malicious wav file.

tags | exploit
SHA-256 | 6d06432f54e8ec7ac7db4d9cbb05a0800262ff09f5a802304ab7ffd7400318a2
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close