what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2013-10-08

Linksys WRT110 Remote Command Execution
Posted Oct 8, 2013
Authored by juan vazquez, Craig Young, joev | Site metasploit.com

The Linksys WRT110 consumer router is vulnerable to a command injection exploit in the ping field of the web interface.

tags | exploit, web
advisories | CVE-2013-3568
SHA-256 | 44b428488518ed2abeee03160462e56c8203577c382cafa8ace86476e15928be
VidiScript 1.0.3a Cross Site Scripting
Posted Oct 8, 2013
Authored by Gabby

VidiScript version 1.0.3a suffers from persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 988e1093ddc98eb75faec5b41508cc2eb5edfea5a9d04fc7de0b1b5826e1a6d8
davfs2 1.4.6 / 1.4.7 Privilege Escalation
Posted Oct 8, 2013
Authored by Lorenzo Cantoni

davfs2 versions 1.4.6 and 1.4.7 local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2013-4362, OSVDB-97417
SHA-256 | 12792272e2f14c05cd5916d2f5ecf86ed1ff086e3ba5bf6686de4edea747c9fe
Microsoft Security Bulletin Release For October, 2013
Posted Oct 8, 2013
Site microsoft.com

This bulletin summary lists 8 released Microsoft security bulletins for October, 2013.

tags | advisory
SHA-256 | d0d54cdceb56314ad3743e50ffe14f28cb7fdb815bbb8a279409089ba1b94048
Red Hat Security Advisory 2013-1411-01
Posted Oct 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1411-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions. If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat, osx
advisories | CVE-2013-4332
SHA-256 | 9c1b6ecde67c864702835dfa3c866327c6d8572763bc1bdbc5ddd0e3ce9ab320
Debian Security Advisory 2769-1
Posted Oct 8, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2769-1 - Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, freebsd, debian
advisories | CVE-2013-5691, CVE-2013-5710
SHA-256 | f28d7bebc27c12dd5bebb230f071a816d319c8f0c43da006404a93fa32c755eb
ONO Hitron CDE-30364 Router Denial Of Service
Posted Oct 8, 2013
Authored by Matias Mingorance Svensson

ONO Hitron CDE-30364 router suffers from a denial of service vulnerability when presented with an overly large GET request.

tags | exploit, denial of service
SHA-256 | c44741f5b0e596bccd8241e6a0e550ae32cde4688b4fdce18621e6f0940bb190
IP Phone Scanning Made Easy 0.12
Posted Oct 8, 2013
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

Changes: This release adds a new SIP Scanner (UDP or TCP) module with administration services detection and information gathering on SIP UA or server. Threads have been implemented in the launcher. Several tools can now be used at the same time.
tags | tool, web, scanner, perl
systems | unix
SHA-256 | ecb0015dcaf2c33676782b33e8df8f700c71993eb29d2d41c8dc2453fdec7dc0
JBrute 0.96
Posted Oct 8, 2013
Authored by Gonzalo Camino | Site sourceforge.net

JBrute is a password cracking tool written in Java that uses both brute force and dictionary attack methodologies with a built-in rule pre-processor similar to John the Ripper. It supports several standard algorithms and several algorithms from proprietary applications (like Microsoft SQL Server, Oracle, SYBASE, and so on).

Changes: Various bug fixes.
tags | tool, java, cracker
SHA-256 | 194b487b994980460a0572ffbf79c63a2032608cb60242ec4061d6b8b8c6b720
WordPress Quick Contact Form 6.0 Cross Site Scripting
Posted Oct 8, 2013
Authored by Zy0d0x | Site nullsecurity.net

WordPress Quick Contact Form plugin version 6.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b056c7178db8199e0e99ca13e50f19d91b3b427da8a2f9898a12109f787bc235
WHMCS 5.2.7 SQL Injection
Posted Oct 8, 2013
Authored by localhost.re

WHMCS version 5.2.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | OSVDB-98119
SHA-256 | f16c616cd23ad43b421acd50b490c66cf0bdacacb824be43d2cab94fa1c72954
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close