what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2014-04-04

ASUS RT-AC68U Cross Site Scripting
Posted Apr 4, 2014
Authored by Joaquim Brasil de Oliveira

ASUS RT-AC68U web management interface suffers from a reflective cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 7ba8e8486a3d4055ad7a78d96b2f3cb20a29f14fd45f7d1245bd8fc10e936f97
ASUS RT-AC68U Remote Command Execution
Posted Apr 4, 2014
Authored by Joaquim Brasil de Oliveira

ASUS RT-AC68U web management interface suffers from a remote command execution vulnerability.

tags | exploit, remote, web
SHA-256 | 7b176b54c84640f3cc5a4774305b03a76850a6c9f8faf88663140ab2d62a9bac
PIR Workshop 2014 Call For Papers
Posted Apr 4, 2014
Site cs-sys-1.uis.georgetown.edu

Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security, also known as PIR Workshop 2014, has announced its Call For Papers. It will be held July 11, 2014 in Gold Coast, Australia.

tags | paper, conference
SHA-256 | e1e303b707135673aefdb374795d570799f7949384c538a1e28b2aaadaa6ed24
Google Voice Private/Unknown Number Disclosure
Posted Apr 4, 2014
Authored by Simo Ben Youssef | Site morxploit.com

Google Voice discloses private and unknown numbers that have called you through its search functionality. This exploit helps perform a brute force attack against your contact list.

tags | exploit
SHA-256 | 2739f68f433c91007b9fb24f4e39edbf7eaefc8f5952bef0152ce3eac0539310
ECE Projects Cross Site Scripting
Posted Apr 4, 2014
Authored by Wang Jing

ECE Projects suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | be7a6e80f2bcf9b5552f29fecc0f7f219330cf62dd242782560185fb34bb6131
WhatsApp Database Extraction
Posted Apr 4, 2014
Authored by Monendra Sahu

This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.

tags | paper
SHA-256 | 68ad521e10670bbb65c0d7b97ed8b497b83fd054c87bf2fe62d0596ebb035636
NCCGroup EasyDA Credential Disclosure
Posted Apr 4, 2014
Authored by 0a29406d9794e4f9b30b3c5d6702c708

NCCGroup EasyDA suffers from a credential disclosure vulnerability due to misuse of /tmp.

tags | exploit
SHA-256 | 5b7ef0d48812b65b840f408b3ca2c5a9a046d447cc42215e356f33637313da7a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close