exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 61 RSS Feed

Files Date: 2009-09-11 to 2009-09-12

Botan C++ Crypto Algorithms Library
Posted Sep 11, 2009
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: A bug in processing multiple XTS messages in a single filter has been fixed. A new option --no-autoload is available in configure.py, which allows for creating very minimal builds for specialized applications.
tags | library
SHA-256 | a4087fa008aa6b84a6780c9eedbe63319fba2f27bb5f182a1b0f349eba02ea24
FreeRadius Packet Of Death
Posted Sep 11, 2009
Authored by Matthew Gillespie

FreeRadius versions below 1.1.8 remote packet of death exploit.

tags | exploit, remote, denial of service
advisories | CVE-2009-3111
SHA-256 | 6e98a461a80fd4c174e6b711128797dfcf9bee0de7edf590ef3cb43aab766c42
Zero Day Initiative Advisory 09-064
Posted Sep 11, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-064 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of malformed FlashPix (.fpx) files. While parsing the SectorShift and cSectFat fields from the header, the application will multiply 2 user-controlled 32-bit values and utilize this for an allocation. If the result of the multiplication is greater than 32bits, the application will allocate an undersized heap chunk. Later, the application will copy file data directly into this buffer leading to a buffer overflow which can allow for code execution under the context of the currently logged in user.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
advisories | CVE-2009-2798
SHA-256 | 5a4410675af950264600ad06b00ee982607c01afd0cad713f369fa0eda24e10d
Zero Day Initiative Advisory 09-063
Posted Sep 11, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-063 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of samples from a malformed MOV file utilizing the H.264 codec. While parsing data to render the stream, the application will mistrust a length that is used to initialize a heap chunk that was allocated in a header. If the length is larger than the size of the chunk allocated, then a memory corruption will occur leading to code execution under the context of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2009-2799
SHA-256 | eaec113e9930ff8121c82d977917d1e2ffceb5afadfb54ccfa6cd18f0c6b492a
PHP-IPNMonitor SQL Injection
Posted Sep 11, 2009
Authored by noname | Site antisecurity.org

PHP-IPNMonitor suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | aae4f835b7c471597aac6081575775b457f154bf95a62dd2fb6ac8c0fe41143d
Gyro 5.0 XSS / SQL Injection
Posted Sep 11, 2009
Authored by OoN_Boy | Site oonboy.blogspot.com

Gyro version 5.0 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 8b5d690192d090417a68d4fb4c6b92448c513acbd1a069e66d9e5a46df1713ad
Xerver HTTP Server 4.32 Disclosure
Posted Sep 11, 2009
Authored by Dr_IDE

Xerver HTTP Server version 4.32 suffers from an arbitrary source code disclosure vulnerability.

tags | exploit, web, arbitrary, info disclosure
SHA-256 | 803582b73c3c8872f07d31868a3995e5cc4c8ae67f8c87f396f3f0a8a4968915
Kolibri+ Webserver 2 Source Code Disclosure
Posted Sep 11, 2009
Authored by SkuLL-HacKeR

Kolibri+ Webserver 2 suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 71ecaf676c0083eb07646ae20aeed7ebb70cdeda32d483b3f555f0a5f771d561
Secunia Security Advisory 36655
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has reported two vulnerabilities in MYRE Holiday Rental Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 29e5d8f8b76b851e5e93eb58498ccda6a29a7f39dc9bdd6fcee0a2e0c9ba3940
Secunia Security Advisory 36710
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a vulnerable system.

tags | advisory, spoof, vulnerability
systems | linux, ubuntu
SHA-256 | 21fb253129bef2bf7d2e88a060b47b9096e00630b0aa9bd533f284e7ba98698e
Secunia Security Advisory 36639
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported two vulnerabilities in Ventrilo Client, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 692bdc98bca31a085d9f21e969d5f57546e311c8070661ef059bdcf158566831
Secunia Security Advisory 36672
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Match Agency BiZ, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 8aa3f6724b0c57fac40cb017ad53d5dd359143ed1f17990277b8bef4d6d55039
Secunia Security Advisory 36662
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Buy Dating Site, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 9b178910a476bae75bc8f34dfb9e1dcd7adfe1e3952763bc978c7e5d8bfb94bf
Secunia Security Advisory 36701
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 3fc7cb91e46c0bd637725c3bcc828460e0c67e7746dda0bde178904d76349c4b
Secunia Security Advisory 36714
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in yoyaku_v41, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5ea168933891138453bcaadb9e270649cebbd1f59d464447281a46f124e796b7
Secunia Security Advisory 36661
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Accommodation Hotel Booking Portal Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | a6f54222d497c756c4635aff95475ec356063ed98f3f7f6d0ae83ac1c0a76cbe
Secunia Security Advisory 36659
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has reported a vulnerability in iDesk, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 59cef7a157203fc1635d9f94112709b799e94d89df1504555288a915e0e9c7c5
Secunia Security Advisory 36648
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Nullam Blog, which can be exploited by malicious people to disclose sensitive information and conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | a2dd1f0dce0e31106a76b7d6a102c9a29ec909a02e550109b9ed1ad3c6e1d27e
Secunia Security Advisory 36680
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and some vulnerabilities have been discovered in An image gallery, which can be exploited by malicious people to disclose certain system information and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 6c565dbc9ab220d37f09b13775635588063ad0db64294384267b7fa7f3602093
Secunia Security Advisory 36693
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xapian-omega. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, debian
SHA-256 | 575c864e5173e928be0b93ffda911ed47659ac68274e59c27efb65c099bca90f
Secunia Security Advisory 36683
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has acknowledged some security issues in lmbench, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 5693796913584e61c34c411fe482ec91c5563a1f19a1f4fea230d829c6620b50
Secunia Security Advisory 36667
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libsilc. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 822e14b7fd3c0b03b63d019425b3ac2cb79d9f62d70d3bf853434dfde137b7ca
Secunia Security Advisory 36694
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for tkman. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | cc09263bc96e47babc9f25032a68807f9ad3f2b69487fff1724adfdaeed1cede
Secunia Security Advisory 36682
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gccxml. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | ff87c66063dda0fba7c286089dcbb10ba3ff5e5f253ba29313ae68a294555238
Secunia Security Advisory 36687
Posted Sep 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for aMule. This fixes a security issue, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, gentoo
SHA-256 | f35bcf0a318f3b20e43673f17abf0972aa6cb14ed497fd6c2b46943b4caa67bb
Page 2 of 3
Back123Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close