exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-10-04

Debian Security Advisory 2768-1
Posted Oct 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2768-1 - A heap-based buffer overflow vulnerability was found in icedtea-web, a web browser plugin for running applets written in the Java programming language. If a user were tricked into opening a malicious website, an attacker could cause the plugin to crash or possibly execute arbitrary code as the user invoking the program.

tags | advisory, java, web, overflow, arbitrary
systems | linux, debian
advisories | CVE-2013-4349
SHA-256 | 14e78ce58744b326f40cc027695a21d9217c02ed90d34adb3c42075f4b0bec85
Ice Cold Apps Servers Ultimate 6.0.2(12) Remote Command Execution
Posted Oct 4, 2013
Authored by Larry W. Cashdollar

Ice Cold Apps Servers Ultimate version 6.0.2(12) for Android has no credentials by default and authentication is disabled for telnet/ssh/ftp, allowing remote access to the device's storage.

tags | exploit, remote
SHA-256 | c0c01528feb7496f118fefa0d1d9c613ae250458d43874a7d8415340fdbd70bb
Zabbix 2.0.8 SQL Injection
Posted Oct 4, 2013
Authored by B. Schildendorfer | Site sec-consult.com

Zabbix versions 2.0.8 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2013-5743
SHA-256 | b2dde0d085a8d1f2111b9eea03d6c543e39033d9b878ba6a51f744598318cb60
Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet Code Execution
Posted Oct 4, 2013
Authored by rgod | Site retrogod.altervista.org

Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) marshalled object remote code execution exploit.

tags | exploit, remote, web, code execution
SHA-256 | b275ef861edfedcc0c2663fb34bc9cd3f90533f1d025aca7c3f439465142c3d5
Gentoo Linux Security Advisory 201310-01
Posted Oct 4, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-1 - The Module-Signature module for Perl has insufficient path checks, allowing a remote attacker to execute arbitrary Perl code. Versions prior to 0.720.0 are affected.

tags | advisory, remote, arbitrary, perl
systems | linux, gentoo
advisories | CVE-2013-2145
SHA-256 | d76431bf795a9a68e8e81a1cf6605346ceaf60cda57f5cf6b58e47871ba66919
CMS Formulasi 2.07 XSS / CSRF / SQL Injection
Posted Oct 4, 2013
Authored by Sarahma Security

CMS Formulasi version 2.07 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 31236b0c0d88696852ea9249ac4edc8b201e44dc4205034acd8af58e87dd4bf8
SoftHSM 1.3.5
Posted Oct 4, 2013
Authored by Rickard Bellgrim | Site wiki.opendnssec.org

SoftHSM is an implementation of a cryptographic store accessible through a PKCS#11 interface. You can use it to explore PKCS#11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM uses Botan for its cryptographic operations.

Changes: Improved handling of a busy database. Adds -Wall -Werror flags and fixes the warnings. Fixes more warnings on EPEL.
tags | library
systems | unix
SHA-256 | 28b5062a13450faf6099fcb82d25d21f0ac7d202ba31ec85e943246cdcf87ebd
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close