exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2013-10-08

Linksys WRT110 Remote Command Execution
Posted Oct 8, 2013
Authored by juan vazquez, Craig Young, joev | Site metasploit.com

The Linksys WRT110 consumer router is vulnerable to a command injection exploit in the ping field of the web interface.

tags | exploit, web
advisories | CVE-2013-3568
SHA-256 | 44b428488518ed2abeee03160462e56c8203577c382cafa8ace86476e15928be
VidiScript 1.0.3a Cross Site Scripting
Posted Oct 8, 2013
Authored by Gabby

VidiScript version 1.0.3a suffers from persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 988e1093ddc98eb75faec5b41508cc2eb5edfea5a9d04fc7de0b1b5826e1a6d8
davfs2 1.4.6 / 1.4.7 Privilege Escalation
Posted Oct 8, 2013
Authored by Lorenzo Cantoni

davfs2 versions 1.4.6 and 1.4.7 local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2013-4362, OSVDB-97417
SHA-256 | 12792272e2f14c05cd5916d2f5ecf86ed1ff086e3ba5bf6686de4edea747c9fe
Microsoft Security Bulletin Release For October, 2013
Posted Oct 8, 2013
Site microsoft.com

This bulletin summary lists 8 released Microsoft security bulletins for October, 2013.

tags | advisory
SHA-256 | d0d54cdceb56314ad3743e50ffe14f28cb7fdb815bbb8a279409089ba1b94048
Red Hat Security Advisory 2013-1411-01
Posted Oct 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1411-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions. If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat, osx
advisories | CVE-2013-4332
SHA-256 | 9c1b6ecde67c864702835dfa3c866327c6d8572763bc1bdbc5ddd0e3ce9ab320
Debian Security Advisory 2769-1
Posted Oct 8, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2769-1 - Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, freebsd, debian
advisories | CVE-2013-5691, CVE-2013-5710
SHA-256 | f28d7bebc27c12dd5bebb230f071a816d319c8f0c43da006404a93fa32c755eb
ONO Hitron CDE-30364 Router Denial Of Service
Posted Oct 8, 2013
Authored by Matias Mingorance Svensson

ONO Hitron CDE-30364 router suffers from a denial of service vulnerability when presented with an overly large GET request.

tags | exploit, denial of service
SHA-256 | c44741f5b0e596bccd8241e6a0e550ae32cde4688b4fdce18621e6f0940bb190
IP Phone Scanning Made Easy 0.12
Posted Oct 8, 2013
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

Changes: This release adds a new SIP Scanner (UDP or TCP) module with administration services detection and information gathering on SIP UA or server. Threads have been implemented in the launcher. Several tools can now be used at the same time.
tags | tool, web, scanner, perl
systems | unix
SHA-256 | ecb0015dcaf2c33676782b33e8df8f700c71993eb29d2d41c8dc2453fdec7dc0
JBrute 0.96
Posted Oct 8, 2013
Authored by Gonzalo Camino | Site sourceforge.net

JBrute is a password cracking tool written in Java that uses both brute force and dictionary attack methodologies with a built-in rule pre-processor similar to John the Ripper. It supports several standard algorithms and several algorithms from proprietary applications (like Microsoft SQL Server, Oracle, SYBASE, and so on).

Changes: Various bug fixes.
tags | tool, java, cracker
SHA-256 | 194b487b994980460a0572ffbf79c63a2032608cb60242ec4061d6b8b8c6b720
WordPress Quick Contact Form 6.0 Cross Site Scripting
Posted Oct 8, 2013
Authored by Zy0d0x | Site nullsecurity.net

WordPress Quick Contact Form plugin version 6.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b056c7178db8199e0e99ca13e50f19d91b3b427da8a2f9898a12109f787bc235
WHMCS 5.2.7 SQL Injection
Posted Oct 8, 2013
Authored by localhost.re

WHMCS version 5.2.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | OSVDB-98119
SHA-256 | f16c616cd23ad43b421acd50b490c66cf0bdacacb824be43d2cab94fa1c72954
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close