Exploit the possiblities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2013-03-18

Ruby Gem Fastreader 1.0.8 Code Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Fastreader version 1.0.8 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
MD5 | be28785411aa8da69cd286001e5caf2d
Security Explorations Java Issue 54
Posted Mar 18, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This document provides the technical details of Issue 54 that was reported to Oracle on Feb 25, 2013 and that was evaluated by the company as the "allowed behavior".

tags | advisory
MD5 | f092afb7346a718a1d6a7c3ff600d9dd
Ruby Gem Command Wrap Command Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Command Wrap suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
MD5 | 1e25289055c228c76ad830b21ab7b11b
Port Scanning /0 Using Insecure Embedded Devices
Posted Mar 18, 2013
Authored by Internet Census

Internet Census 2012 - Port scanning /0 using insecure embedded devices. This write up discusses the Carna Botnet that was created and leveraged to scan all IPv4 addresses. It made use of 420 thousand insecure devices to complete the effort.

tags | paper
MD5 | 2e23819cde3475b4994a1ad72fadeca8
Hackers 2 Hackers Conference 10th Edition Call For Papers
Posted Mar 18, 2013
Site h2hc.com.br

The call for papers for H2HC 10th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 3rd through the 8th, 2013.

tags | paper, conference
MD5 | 28896118e2b4088ace452bbf15cd15b0
NOPcon 2013 Call For Papers
Posted Mar 18, 2013
Authored by NOPcon CFP

NOPcon is a free non-profit hacker conference without any sales pitches. The second edition has released its call for papers and will take place June 6, 2013 in Istanbul, Turkey.

tags | paper, conference
MD5 | 5ae9f10a84d7ec3f5a5d4ec50da31748
EA Origin Insecurity
Posted Mar 18, 2013
Authored by Luigi Auriemma, Donato Ferrante | Site revuln.com

In this paper the authors uncover and demonstrate an interesting way to convert local bugs and features in remotely exploitable security vulnerabilities by using the well known EA Origin platform as an attack vector against remote systems. The attack proposed in this paper is similar to the attack targeting the Steam platform that they detailed in their previous research. The Origin attack detailed in this paper affects more than 40 million Origin users.

tags | advisory, remote, local, vulnerability
MD5 | c92b95ac5695e15bc233f966bcf7c887
Rebus:list SQL Injection
Posted Mar 18, 2013
Authored by Robert Cooper

Rebus:list suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 075a7abe469665d7c1e24e531a148298
IPSet Bash Completion 2.0
Posted Mar 18, 2013
Authored by AllKind | Site sourceforge.net

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.

Changes: This release contains a lot of fixes and improvements.
tags | tool, shell, firewall, bash
systems | linux, unix
MD5 | c8404c0914288c0c609c20ad8117a6e6
Microsoft Windows USB RNDIS Overflow
Posted Mar 18, 2013
Authored by Andy Davis | Site nccgroup.com

NCC Group has discovered a USB RNDIS driver kernel pool overflow in Microsoft Windows. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, overflow, kernel
systems | windows
MD5 | a644a334daed6736c0096421a13ecea6
Data-Clone - A New Way To Attack Android Apps
Posted Mar 18, 2013
Authored by 80vul | Site 80vul.com

This papers discusses a new way to attack Android applications for bypassing password authentication.

tags | paper
MD5 | 020276fac351288e5c7e45d65ccaa351
Joomla RSfiles SQL Injection
Posted Mar 18, 2013
Authored by ByEge

The Joomla RSfiles component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0118f629068f8732e9c2c63f22124e97
WordPress Simply Poll 1.4.1 CSRF / XSS
Posted Mar 18, 2013
Authored by m3tamantra

WordPress Simply Poll third party plugin version 1.4.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 263c7c3e02d6eb0e67e355b07960311e
Sami FTP Server 2.0.1 PUT Command Buffer Overflow
Posted Mar 18, 2013
Authored by ne0z

Sami FTP server version 2.0.1 PUT command buffer overflow exploit with DEP bypass. Written in Python.

tags | exploit, overflow, python
MD5 | 049bf1f457528c0e5e50b4bb2ac86ffa
Debian Security Advisory 2650-2
Posted Mar 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2650-2 - The recent security update for libvirt was found to cause a regression. The kvm/qemu processes weren't run as the `kvm` user anymore in order to fix the file/device ownership changes, but the processes where not correctly configured to use the `kvm` group either. When the user would try to run a virtual machine, the process was denied access to the /dev/kvm device node, preventing the virtual machine to run.

tags | advisory
systems | linux, debian
advisories | CVE-2013-1766
MD5 | 2a98529aefaf0a78da7e5825dc5036d5
Scripteen FunPhoto Mix Cross Site Scripting
Posted Mar 18, 2013
Authored by 3spi0n

Scripteen FunPhoto Mix suffers form a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b90befd515dd1049f8845c0715298e8b
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    12 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close