what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 59 RSS Feed

Files

Entropy Broker RNG 2.0
Posted Oct 30, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: Entropy broker is now fully multi-threaded so that no client can block the broker, and higher bitrates can now be achieved. The OpenSSL dependency has been replaced by the crypto++ library. A 'configure' script has been added. This release has been checked for software defects with Coverity. The network protocol has been adapted for bigger block sizes. Ciphers/hashes are now fully user selectable. There is reduced broker entropy usage.
tags | tool, encryption
systems | linux
SHA-256 | 39eaa71765d33198222497e34aab245d65b3b844120d11bec809f454b85721ad

Related Files

Event Booking Calendar 4.0 Cross Site Scripting
Posted Sep 6, 2023
Authored by nu11secur1ty

Event Booking Calendar version 4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 32c73154ac96e99d3a4e6c304cd5e6f09a5a9afcb2892ee40f8a36c71c285475
E-Biz CMS 2.0 Cross Site Request Forgery
Posted Aug 14, 2023
Authored by indoushka

E-Biz CMS version 2.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 0051b3ec1334ec05af6d228c8a79d4a9b5645a0e801b6a2ea22a9b8fb0623d1d
e-Biz Technocrats Pvt.Ltd SQL Injection
Posted May 29, 2023
Authored by K1LL3rB4LL

It appears that sites designed by e-Biz Technocrats Pvt.Ltd suffer from a remote SQL injection vulnerability. As they do not provide any sort of versioning with their offerings, the researcher was unable to provide affected versions. Versions as of May 11, 2023 were affected.

tags | exploit, remote, sql injection
SHA-256 | 92cf79073e5009f343666e2a43e0a350c61dd730a3d354ea6bc3bd1d42f1ee8d
eBankIT 6 Arbitrary OTP Generation
Posted May 22, 2023
Authored by Steeven Rodriguez

In eBankIT 6, the public endpoints /public/token/Email/generate and /public/token/SMS/generate allow generation of OTP messages to any email address or phone number without validation.

tags | exploit
advisories | CVE-2023-33291
SHA-256 | 972d016f9392b59d94e5953a0d7fcae1086a2619511edc6b73d5277ccf8d9e01
ebankIT 6 Denial Of Service
Posted Apr 28, 2023
Authored by Jake Murphy

ebankIT versions prior to 7 suffer from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2023-30455
SHA-256 | 667e017380dd636cee2eeb00041c4e65ca7a482014707822dbdd9e8236100248
ebankIT 6 Cross Site Scripting
Posted Apr 28, 2023
Authored by Jake Murphy

ebankIT versions prior to 7 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2023-30454
SHA-256 | 7931b012672b6d0e59c41ad92350890e7e94c1bf444f21f043305ff4aff364fc
eBeam Education Suite 2.5.0.9 Unquoted Service Path
Posted Mar 15, 2021
Authored by Luis Martinez

eBeam Education Suite version 2.5.0.9 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 07a48d0a80b6e6fb6cffc7ab3242dea1c5592445f28a09fc4e95014cb6f08235
EBBISLAND EBBSHAVE 6100-09-04-1441 Remote Buffer Overflow
Posted Jan 8, 2020
Authored by Harrison Neal

EBBISLAND EBBSHAVE 6100-09-04-1441 suffers from a remote buffer overflow vulnerability.

tags | exploit, remote, overflow
advisories | CVE-2017-3623
SHA-256 | 752c0dd1427815a28ffca2405491b7679ebea46ed02260ee83be0b02302b6008
eBrigade ERP 4.5 Arbitrary File Download
Posted Jan 10, 2019
Authored by Ozkan Mustafa Akkus

eBrigade ERP version 4.5 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | 117f9249bea7771a2cfcf9efcd9f0ce6b5c7d2729e36d747a9ede0dadbe6be0a
eBrigade ERP 4.5 SQL Injection
Posted Jan 10, 2019
Authored by Ihsan Sencan

eBrigade ERP version 4.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cf9aedda2edaa02aaf53f3a035433749d6b7986728967e7bc1a6203cafaf8c5f
Ebook CMS 1.0 Cross Site Scripting
Posted Jan 2, 2018
Authored by ShanoWeb

Ebook CMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0f511f580f83da56729aa5b8e75330cf6b99030e43afc84821ed8def3dd4b218
Entrepreneur Bus Booking Script 3.0.4 SQL Injection
Posted Dec 12, 2017
Authored by Ihsan Sencan

Entrepreneur Bus Booking Script version 3.0.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 160f2084f39a16b9b1866bff825478c95ebafd68ef074349d7f24b74d84c9b34
eBay Auction Premium Clone Script 6.42 SQL Injection
Posted Apr 21, 2017
Authored by Bilal Kardadou

eBay Auction Premium Clone Script version 6.42 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d15360d964854fa4c0bfa270acabafbd26b2a5d73301cf3efd8fe5eb7cb7a181
Entrepreneur B2B Script 2.0.4 SQL Injection
Posted Mar 6, 2017
Authored by Ihsan Sencan

Entrepreneur B2B script version 2.0.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 087b33806b63b185896e7dea753503bb93c7fb1cf719b78d9922844685c83c3f
Ebay Cross Site Scripting
Posted Feb 18, 2016
Authored by Alexander Korznikov

ebay.com suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a29879e61b3488fdba8438c12dd745e034bbd5c2a76b31866e02d794bf818ecd
eBay Magento XXE Injection
Posted Oct 30, 2015
Authored by Dawid Golunski

eBay Magento CE versions 1.9.2.1 and below and eBay Magento EE versions 1.14.2.1 and below suffer from an XXE injection vulnerability.

tags | exploit, xxe
SHA-256 | 08393363d6670e33368d62daac52944168d2958ae3fd00c5baedaa4999a731b3
eBay.com ocsnext CSS Injection
Posted Dec 22, 2014
Authored by Yann CAM

The eBay.com ocsnext sub-domain suffers from a CSS injection vulnerability.

tags | exploit
SHA-256 | 14a1a806af2d04d309cc8ea67c5c091b21b8e0f149d31e638c6272bf68d40cbc
eBay SQL Injection
Posted May 25, 2014
Authored by Joshua Rogers

3.ebay.com.au suffered from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | ac896c8d7f84eab08d888bc38f0ffbac7bc78ada59535a0ebae9c502787f512c
Ebuddy Web Messenger Disclosure / CSRF
Posted Sep 4, 2013
Authored by Juan Carlos Garcia

Ebuddy Web Messenger suffers from index disclosure, cross site request forgery, htaccess file disclosure, and insecure credential transport vulnerabilities.

tags | exploit, web, vulnerability, info disclosure, csrf
SHA-256 | ccaf79bd154471179fb4406fdc64b21ea02903e1d8c4dc8ee30b274d01f17dff
Entropy Broker RNG 2.1
Posted Dec 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release adds a Web interface for viewing usage statistics, per-user bandwidth limits, and many small fixes.
tags | encryption
systems | linux
SHA-256 | a3f390c0f95d70ab5d90a8cb508fd38446170748012ce225225580bd14f4417e
Elite Bulletin Board 2.1.21 SQL Injection
Posted Dec 20, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

Elite Bulletin Board version 2.1.21 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2012-5874
SHA-256 | f6238bc2858a2e64a1c3b85e0997dc653e553e7e8701b8064c8c0e6b3ad71bbb
Entropy Broker RNG 2.0.1
Posted Nov 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release fixes crashes with the Linux kernel client.
tags | tool, encryption
systems | linux
SHA-256 | 3d1e4c41d08e5baf8af7d5cee22f9eb7fd7ed309f653a29a3211116a0cf24340
Entropy Broker RNG 1.2
Posted Sep 18, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release has full IPv6 support, has bps output fixes, can now retrieve entropy data from smart cards, and has support for multiple broker servers. EGD server/client now supports TCP as well (for better compatibility with EntropyKey). There are fixes for Fedora and Coverity warning fixes.
tags | encryption
systems | linux
SHA-256 | 3ecddde77082e049a2056e7fee7d05301ade18b02e1ebc838e4af707f2a74d39
Entropy Broker RNG 1.1
Posted Sep 4, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: Fix for busy-loop when pools empty.
tags | encryption
systems | linux
SHA-256 | 64323f1801115658cba288d825257b69c326ef6e92dde888338337aff8711c82
Entropy Broker RNG 1.0.1
Posted Aug 14, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This is an important bugfix release. This version replaces the ivec initializer code with something more sensible.
tags | encryption
systems | linux
SHA-256 | e505291a3ada9f1ba3928113fa70f9f79bfc771b2fe8e20560d612d5c64beb5b
Page 1 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close