what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Cristofaro Mune

Email addressprivate
First Active2009-09-07
Last Active2010-07-15
View User Profile
D-Link DAP-1160 formFilter Buffer Overflow
Posted Jul 15, 2010
Authored by Cristofaro Mune | Site icysilence.org

A buffer overflow condition can be triggered on the D-Link DAP-1160 by setting URL filtering for an overly long URL, leading to possible arbitrary code execution or denial of service. Successful authentication is required in order to exploit the vulnerability, but attackers can leverage other vulnerabilities for achieving unauthenticated remote exploitation.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability, code execution
SHA-256 | bd3ea2fdf1b138ba8150e58e89eabdecdbbee7ee5b621500a372f19db8a7f868
D-Link DAP-1160 Authentication Bypass
Posted Jun 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The D-Link DAP-1160 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | a9f5cea857a1666b127ea7343b56365f2741ec2153b1da2c5d7ff03654988c02
D-Link DAP-1160 Unauthenticated Remote Configuration
Posted Jun 29, 2010
Authored by Cristofaro Mune | Site icysilence.org

Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.

tags | exploit, remote
SHA-256 | d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
Linksys WAP54Gv3 debug.cgi Cross Site Scripting
Posted Jun 25, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 suffers from a cross site scripting vulnerability in debug.cgi.

tags | exploit, cgi, xss
SHA-256 | 294313708cbc83d56122cedaf08f5a02cddf5080987bfeafe6d1d13f7fe35f20
Linksys WAP54Gv3 Remote Debug Root Shell
Posted Jun 9, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 has a debug interface allowing for the execution of root privileged shell commands. Hardcoded credentials, that cannot be changed by user, can be used for accessing the debug interface.

tags | exploit, shell, root
SHA-256 | fdf38433a8997957918a85f42b989155a632e3f26c1a3e0c4b124196a974e81a
Netgear WG602v4 Saved Password Stack Overflow
Posted May 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Netgear WG602v4 suffers from a saved password stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 43880da74509f3b5b9103626adbc669276aacebb54cf3a964bf94e7a2dffa3a0
Pidgin IRC TOPIC Message Denial Of Service
Posted Sep 7, 2009
Authored by Cristofaro Mune | Site icysilence.org

Pidgin version 2.6.1 suffers from a remote denial of service vulnerability when receiving a malformed IRC TOPIC message from a malicious IRC server.

tags | advisory, remote, denial of service
advisories | CVE-2009-2703
SHA-256 | 7ab8b43ac2c2acb3ad6eba05eb13a7a79ce2e4e84598528d24915d411c6ce887
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close