seeing is believing
Showing 1 - 16 of 16 RSS Feed

Files Date: 2013-03-18

Ruby Gem Fastreader 1.0.8 Code Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Fastreader version 1.0.8 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
MD5 | be28785411aa8da69cd286001e5caf2d
Security Explorations Java Issue 54
Posted Mar 18, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This document provides the technical details of Issue 54 that was reported to Oracle on Feb 25, 2013 and that was evaluated by the company as the "allowed behavior".

tags | advisory
MD5 | f092afb7346a718a1d6a7c3ff600d9dd
Ruby Gem Command Wrap Command Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Command Wrap suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
MD5 | 1e25289055c228c76ad830b21ab7b11b
Port Scanning /0 Using Insecure Embedded Devices
Posted Mar 18, 2013
Authored by Internet Census

Internet Census 2012 - Port scanning /0 using insecure embedded devices. This write up discusses the Carna Botnet that was created and leveraged to scan all IPv4 addresses. It made use of 420 thousand insecure devices to complete the effort.

tags | paper
MD5 | 2e23819cde3475b4994a1ad72fadeca8
Hackers 2 Hackers Conference 10th Edition Call For Papers
Posted Mar 18, 2013
Site h2hc.com.br

The call for papers for H2HC 10th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 3rd through the 8th, 2013.

tags | paper, conference
MD5 | 28896118e2b4088ace452bbf15cd15b0
NOPcon 2013 Call For Papers
Posted Mar 18, 2013
Authored by NOPcon CFP

NOPcon is a free non-profit hacker conference without any sales pitches. The second edition has released its call for papers and will take place June 6, 2013 in Istanbul, Turkey.

tags | paper, conference
MD5 | 5ae9f10a84d7ec3f5a5d4ec50da31748
EA Origin Insecurity
Posted Mar 18, 2013
Authored by Luigi Auriemma, Donato Ferrante | Site revuln.com

In this paper the authors uncover and demonstrate an interesting way to convert local bugs and features in remotely exploitable security vulnerabilities by using the well known EA Origin platform as an attack vector against remote systems. The attack proposed in this paper is similar to the attack targeting the Steam platform that they detailed in their previous research. The Origin attack detailed in this paper affects more than 40 million Origin users.

tags | advisory, remote, local, vulnerability
MD5 | c92b95ac5695e15bc233f966bcf7c887
Rebus:list SQL Injection
Posted Mar 18, 2013
Authored by Robert Cooper

Rebus:list suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 075a7abe469665d7c1e24e531a148298
IPSet Bash Completion 2.0
Posted Mar 18, 2013
Authored by AllKind | Site sourceforge.net

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.

Changes: This release contains a lot of fixes and improvements.
tags | tool, shell, firewall, bash
systems | linux, unix
MD5 | c8404c0914288c0c609c20ad8117a6e6
Microsoft Windows USB RNDIS Overflow
Posted Mar 18, 2013
Authored by Andy Davis | Site nccgroup.com

NCC Group has discovered a USB RNDIS driver kernel pool overflow in Microsoft Windows. Unfortunately, as usual, the NCC group are withholding any details for three months.

tags | advisory, overflow, kernel
systems | windows
MD5 | a644a334daed6736c0096421a13ecea6
Data-Clone - A New Way To Attack Android Apps
Posted Mar 18, 2013
Authored by 80vul | Site 80vul.com

This papers discusses a new way to attack Android applications for bypassing password authentication.

tags | paper
MD5 | 020276fac351288e5c7e45d65ccaa351
Joomla RSfiles SQL Injection
Posted Mar 18, 2013
Authored by ByEge

The Joomla RSfiles component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0118f629068f8732e9c2c63f22124e97
WordPress Simply Poll 1.4.1 CSRF / XSS
Posted Mar 18, 2013
Authored by m3tamantra

WordPress Simply Poll third party plugin version 1.4.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 263c7c3e02d6eb0e67e355b07960311e
Sami FTP Server 2.0.1 PUT Command Buffer Overflow
Posted Mar 18, 2013
Authored by ne0z

Sami FTP server version 2.0.1 PUT command buffer overflow exploit with DEP bypass. Written in Python.

tags | exploit, overflow, python
MD5 | 049bf1f457528c0e5e50b4bb2ac86ffa
Debian Security Advisory 2650-2
Posted Mar 18, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2650-2 - The recent security update for libvirt was found to cause a regression. The kvm/qemu processes weren't run as the `kvm` user anymore in order to fix the file/device ownership changes, but the processes where not correctly configured to use the `kvm` group either. When the user would try to run a virtual machine, the process was denied access to the /dev/kvm device node, preventing the virtual machine to run.

tags | advisory
systems | linux, debian
advisories | CVE-2013-1766
MD5 | 2a98529aefaf0a78da7e5825dc5036d5
Scripteen FunPhoto Mix Cross Site Scripting
Posted Mar 18, 2013
Authored by 3spi0n

Scripteen FunPhoto Mix suffers form a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b90befd515dd1049f8845c0715298e8b
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    23 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close