exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Netgear 1.0.0.24 Cross Site Request Forgery
Posted Jan 11, 2016
Authored by CSW Research Lab, Sathish Kumar

Netgear router version 1.0.0.24 with JNR1010 firmware suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | da6530ed94ec74ddcb325b48d68b02ef2fe16d9c6ec393e137a00d4987f9e68a

Related Files

Alpha Networks ADSL2/2+ Wireless Router ASL-26555 Password Disclosure
Posted Aug 17, 2012
Authored by Alberto Ortega

Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.

tags | exploit, remote
SHA-256 | 0acc750576387e5c5c8428df81f18e8f0e01592d9d5308c8ea0f94e991b8de78
Cisco Security Advisory 20120530-iosxr-2
Posted Aug 15, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP-4G and RSP-8G), Route Switch Processor 440 (RSP440), and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.

tags | advisory, denial of service
systems | cisco, osx
SHA-256 | bc07f2e416a80379a131e30d960f750f093f1907368c5841670468346b98ce8e
Thrip Port Scanner
Posted Aug 4, 2012
Authored by grell64

This is a multithreaded scanner that scans many ip addresses on a specified port simultaneously. It is very useful for finding insecure systems when used with such ports as 23 (Telnet) or 8080, which is the web interface for many routers. The author of this program takes no responsibility for the actions of its users.

tags | tool, web, scanner
systems | unix
SHA-256 | 8b00dfe8071bfc1a6b2d42de3eb31f6439e21d035b5ca397aa790740648b7fa1
OpenNHRP NBMA Next Hop Resolution 0.13.1
Posted Jun 23, 2012
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: This release adds minor fixes for configurations with multiple mgre interfaces.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | 118d79062dddb1318eb706054168ad17a030afe1e9ebb59f9dc7c7a7a03bc308
Secunia Security Advisory 49365
Posted Jun 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 2baea6eba9daa04dc1c6d1b6da284cb50f3878531e8f713e71366dc62c1456a8
Neighbor Discovery Shield: Protecting against Neighbor Discovery Attacks
Posted Jun 7, 2012
Authored by Fernando Gont

This document specifies a mechanism that can be implemented in layer-2 devices to mitigate attack vectors based on Neighbor Discovery messages. It is meant to complement other mechanisms implemented in layer-2 devices such as Router Advertisement Guard (RA-Guard) and DHCPv6-Shield, with the goal of achieving a comprehensive IPv6 First Hop Security solution. This document is motivated by the desire to achieve feature parity with IPv4 with respect to First Hop Security mechanisms.

tags | paper
SHA-256 | b0bd48d4dfcf7fc338169df812038a282998457c61b3f8cfb9294a669b43f80a
Cisco Security Advisory 20120530-iosxr
Posted May 31, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.

tags | advisory, denial of service
systems | cisco, osx
SHA-256 | fff41f08fd976df15727676fbdf3534859a2336101b9fdcdc8160a445d8bf795
Secunia Security Advisory 49145
Posted May 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Belkin N150 Wireless Router, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | b6ed506051af274beab68af00bbd9ecab8ea6704351c271c2d0632fcbf57eff3
Cisco Linksys WRT54GL Cross Site Request Forgery
Posted May 8, 2012
Authored by Kalashinkov3

The Cisco Linksys WRT54GL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | cisco
SHA-256 | 15765a5278a3d85691a1560925b05f28f2c55ddd9ccac8024f86755afe32809a
Mikrotik Router Denial Of Service
Posted May 2, 2012
Authored by PoURaN

Mikrotik Router suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | f6813d43ca1accbc159ab893c70c7f6daf4eb163cd6482ab2eb09f4efb630784
Secunia Security Advisory 48840
Posted Apr 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ivano Binetti has reported a vulnerability in Sitecom WLM-2501 Wireless Modem Router 300N, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | c281578e7a42bdfd5e4a45774b36c15ba47c1372079325e32d799823eced520f
Cisco Security Advisory 20120328-mace
Posted Mar 29, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.

tags | advisory, remote, denial of service, vulnerability
systems | cisco
advisories | CVE-2012-1312, CVE-2012-1314
SHA-256 | 788885399c203d07e2f188436e87b949677dbed1fe1b4f9d5901f2a746308dff
Firewall Builder With GUI 5.1.0.3599
Posted Mar 29, 2012
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: Packages for Windows and Mac OS X are now distributed under the GPL, and the source code includes all files necessary to build on Linux, *BSD, Windows, and Mac OS X. This release also includes a few bugfixes in the policy compiler for iptables and for the build problem on Gentoo.
tags | tool, firewall
systems | cisco, linux, unix, openbsd
SHA-256 | 452514a1ec0be1416bfca93603e6c89deb91d1a3a19671c64b5a8868a3743daf
LotusCMS 3.0 eval() Remote Command Execution
Posted Mar 8, 2012
Authored by Alligator Security Team | Site metasploit.com

This Metasploit module exploits a vulnerability found in Lotus CMS 3.0's Router() function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call, therefore allowing remote code execution. The module can either automatically pick up a 'page' parameter from the default page, or manually specify one in the URI option.

tags | exploit, remote, php, code execution
advisories | OSVDB-75095
SHA-256 | 9cfa92781759b0e3fca07d4e2381bdf31f60c42eb04c18946ce17fa3ef4f50c3
STKeyGen BT HomeHub 2 Type A Credential Generator
Posted Mar 2, 2012
Authored by Kevin Devine, James Hall

STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.

tags | tool, wireless
systems | unix
SHA-256 | 7a2300ea3821865509d3b83255e03471dd1e303e529eeb8bcaa3a0382f92ed9c
D-Link DSL-2640B Authentication Bypass
Posted Feb 23, 2012
Authored by Ivano Binetti

The D-Link DSL-2640B ADSL router suffers from a simple authentication bypass vulnerability by spoofing the MAC address of a logged in administrator.

tags | exploit, spoof, bypass
SHA-256 | 12bc1d6056d32882aa0e9cb89830f0cca2bd54029fb7e936e8201175dcf085f6
Mercurycom MR804 Router Denial Of Service
Posted Feb 22, 2012
Authored by demonalex

Mercurycom MR804 Router version 3.8.1 Build 101220 Rel.53006nB suffers from a denial of service vulnerability when fed multiple HTTP headers.

tags | exploit, web, denial of service
SHA-256 | bcb466aefafb323238fa7776d12c39fca5da5fac0996900812c40f57e49cb5ef
Cisco Linksys WAG54GS Cross Site Request Forgery
Posted Feb 22, 2012
Authored by Ivano Binetti

The Cisco Linksys WAG54GS ADSL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | cisco
SHA-256 | bfb35b1a670f2df0c8e171cb6cac8009146ebfef18fbcd82c5a7420cf409e60f
Xavi 7968 ADSL Router Cross Site Request Forgery / Cross Site Scripting
Posted Feb 21, 2012
Authored by Busindre

The Xavi 7968 router suffers from cross site request forgery and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 0c039e2b4d465e7ff02208af6529c8a0ca6aed64f68bf75e27e8e39625367265
Xavi 7968 ADSL Router Denial Of Service
Posted Feb 21, 2012
Authored by Busindre

The Xavi 7968 ADSL router suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 8f3e5a0e91a14404590fc9a47db1d72e3bdb6016bb58863d753c1b975708c2b2
D-Link DSL-2640B Cross Site Request Forgery
Posted Feb 19, 2012
Authored by Ivano Binetti

The D-Link DSL-2640B ADSL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | aef1b3315a162b05f5bead24ba69d1d330f330d4dc5f1ba5d7139ecbfb31f62c
Lightidra IRC Router Scanner
Posted Jan 30, 2012
Authored by eurialo | Site ahacktivia.org

Lightaidra is an IRC commanded tool that allows for scanning and exploiting routers. It also performs flooding.

tags | tool, scanner
systems | unix
SHA-256 | e635493a0bb2cb118a4bfcf366984e92382fe1f4a65b187025ea0b667066c554
RouterDefense 2012_1
Posted Jan 23, 2012
Authored by Francois Ropert | Site code.google.com

RouterDefense is a Cisco IOS security assessment tool. It deep dives into router and switch configurations and reports security recommendations.

systems | cisco, unix
SHA-256 | 56972eb98118ad770c4ed02dd83010c19471fb6183b5df9613c2e91576639a4f
Avaya WinPDM UniteHostRouter 3.8.2 Buffer Overflow
Posted Jan 20, 2012
Authored by Abysssec | Site abysssec.com

Avaya WinPDM UniteHostRouter versions 3.8.2 and below remote pre-auth buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | e60668fa5b27c23dd1c833eb25b44a403111b5eef0cdf05eb8fb7b3e13fe0967
Security Implications Of IPv6 Extensions Headers With Neighbor Discovery Rev 2
Posted Jan 13, 2012
Authored by Fernando Gont | Site ietf.org

IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers. Revision 2 of this document. This revision includes, among other things, a discussion of possible issues with SEND as a result of IPv6 fragmentation.

tags | paper, local
SHA-256 | a8b7a492cc8ab102f8884547a7f042ea0e94a1cdbbad648050eb655bf675f524
Page 1 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close