exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-10-04 to 2013-10-05

Debian Security Advisory 2768-1
Posted Oct 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2768-1 - A heap-based buffer overflow vulnerability was found in icedtea-web, a web browser plugin for running applets written in the Java programming language. If a user were tricked into opening a malicious website, an attacker could cause the plugin to crash or possibly execute arbitrary code as the user invoking the program.

tags | advisory, java, web, overflow, arbitrary
systems | linux, debian
advisories | CVE-2013-4349
SHA-256 | 14e78ce58744b326f40cc027695a21d9217c02ed90d34adb3c42075f4b0bec85
Ice Cold Apps Servers Ultimate 6.0.2(12) Remote Command Execution
Posted Oct 4, 2013
Authored by Larry W. Cashdollar

Ice Cold Apps Servers Ultimate version 6.0.2(12) for Android has no credentials by default and authentication is disabled for telnet/ssh/ftp, allowing remote access to the device's storage.

tags | exploit, remote
SHA-256 | c0c01528feb7496f118fefa0d1d9c613ae250458d43874a7d8415340fdbd70bb
Zabbix 2.0.8 SQL Injection
Posted Oct 4, 2013
Authored by B. Schildendorfer | Site sec-consult.com

Zabbix versions 2.0.8 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2013-5743
SHA-256 | b2dde0d085a8d1f2111b9eea03d6c543e39033d9b878ba6a51f744598318cb60
Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet Code Execution
Posted Oct 4, 2013
Authored by rgod | Site retrogod.altervista.org

Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) marshalled object remote code execution exploit.

tags | exploit, remote, web, code execution
SHA-256 | b275ef861edfedcc0c2663fb34bc9cd3f90533f1d025aca7c3f439465142c3d5
Gentoo Linux Security Advisory 201310-01
Posted Oct 4, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-1 - The Module-Signature module for Perl has insufficient path checks, allowing a remote attacker to execute arbitrary Perl code. Versions prior to 0.720.0 are affected.

tags | advisory, remote, arbitrary, perl
systems | linux, gentoo
advisories | CVE-2013-2145
SHA-256 | d76431bf795a9a68e8e81a1cf6605346ceaf60cda57f5cf6b58e47871ba66919
CMS Formulasi 2.07 XSS / CSRF / SQL Injection
Posted Oct 4, 2013
Authored by Sarahma Security

CMS Formulasi version 2.07 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 31236b0c0d88696852ea9249ac4edc8b201e44dc4205034acd8af58e87dd4bf8
SoftHSM 1.3.5
Posted Oct 4, 2013
Authored by Rickard Bellgrim | Site wiki.opendnssec.org

SoftHSM is an implementation of a cryptographic store accessible through a PKCS#11 interface. You can use it to explore PKCS#11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM uses Botan for its cryptographic operations.

Changes: Improved handling of a busy database. Adds -Wall -Werror flags and fixes the warnings. Fixes more warnings on EPEL.
tags | library
systems | unix
SHA-256 | 28b5062a13450faf6099fcb82d25d21f0ac7d202ba31ec85e943246cdcf87ebd
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close