exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Cristofaro Mune

Email addressprivate
First Active2009-09-07
Last Active2010-07-15
View User Profile
D-Link DAP-1160 formFilter Buffer Overflow
Posted Jul 15, 2010
Authored by Cristofaro Mune | Site icysilence.org

A buffer overflow condition can be triggered on the D-Link DAP-1160 by setting URL filtering for an overly long URL, leading to possible arbitrary code execution or denial of service. Successful authentication is required in order to exploit the vulnerability, but attackers can leverage other vulnerabilities for achieving unauthenticated remote exploitation.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability, code execution
SHA-256 | bd3ea2fdf1b138ba8150e58e89eabdecdbbee7ee5b621500a372f19db8a7f868
D-Link DAP-1160 Authentication Bypass
Posted Jun 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The D-Link DAP-1160 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | a9f5cea857a1666b127ea7343b56365f2741ec2153b1da2c5d7ff03654988c02
D-Link DAP-1160 Unauthenticated Remote Configuration
Posted Jun 29, 2010
Authored by Cristofaro Mune | Site icysilence.org

Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.

tags | exploit, remote
SHA-256 | d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
Linksys WAP54Gv3 debug.cgi Cross Site Scripting
Posted Jun 25, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 suffers from a cross site scripting vulnerability in debug.cgi.

tags | exploit, cgi, xss
SHA-256 | 294313708cbc83d56122cedaf08f5a02cddf5080987bfeafe6d1d13f7fe35f20
Linksys WAP54Gv3 Remote Debug Root Shell
Posted Jun 9, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 has a debug interface allowing for the execution of root privileged shell commands. Hardcoded credentials, that cannot be changed by user, can be used for accessing the debug interface.

tags | exploit, shell, root
SHA-256 | fdf38433a8997957918a85f42b989155a632e3f26c1a3e0c4b124196a974e81a
Netgear WG602v4 Saved Password Stack Overflow
Posted May 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Netgear WG602v4 suffers from a saved password stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 43880da74509f3b5b9103626adbc669276aacebb54cf3a964bf94e7a2dffa3a0
Pidgin IRC TOPIC Message Denial Of Service
Posted Sep 7, 2009
Authored by Cristofaro Mune | Site icysilence.org

Pidgin version 2.6.1 suffers from a remote denial of service vulnerability when receiving a malformed IRC TOPIC message from a malicious IRC server.

tags | advisory, remote, denial of service
advisories | CVE-2009-2703
SHA-256 | 7ab8b43ac2c2acb3ad6eba05eb13a7a79ce2e4e84598528d24915d411c6ce887
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close