exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-10-04

Debian Security Advisory 2768-1
Posted Oct 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2768-1 - A heap-based buffer overflow vulnerability was found in icedtea-web, a web browser plugin for running applets written in the Java programming language. If a user were tricked into opening a malicious website, an attacker could cause the plugin to crash or possibly execute arbitrary code as the user invoking the program.

tags | advisory, java, web, overflow, arbitrary
systems | linux, debian
advisories | CVE-2013-4349
SHA-256 | 14e78ce58744b326f40cc027695a21d9217c02ed90d34adb3c42075f4b0bec85
Ice Cold Apps Servers Ultimate 6.0.2(12) Remote Command Execution
Posted Oct 4, 2013
Authored by Larry W. Cashdollar

Ice Cold Apps Servers Ultimate version 6.0.2(12) for Android has no credentials by default and authentication is disabled for telnet/ssh/ftp, allowing remote access to the device's storage.

tags | exploit, remote
SHA-256 | c0c01528feb7496f118fefa0d1d9c613ae250458d43874a7d8415340fdbd70bb
Zabbix 2.0.8 SQL Injection
Posted Oct 4, 2013
Authored by B. Schildendorfer | Site sec-consult.com

Zabbix versions 2.0.8 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2013-5743
SHA-256 | b2dde0d085a8d1f2111b9eea03d6c543e39033d9b878ba6a51f744598318cb60
Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet Code Execution
Posted Oct 4, 2013
Authored by rgod | Site retrogod.altervista.org

Apache Tomcat / JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) marshalled object remote code execution exploit.

tags | exploit, remote, web, code execution
SHA-256 | b275ef861edfedcc0c2663fb34bc9cd3f90533f1d025aca7c3f439465142c3d5
Gentoo Linux Security Advisory 201310-01
Posted Oct 4, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-1 - The Module-Signature module for Perl has insufficient path checks, allowing a remote attacker to execute arbitrary Perl code. Versions prior to 0.720.0 are affected.

tags | advisory, remote, arbitrary, perl
systems | linux, gentoo
advisories | CVE-2013-2145
SHA-256 | d76431bf795a9a68e8e81a1cf6605346ceaf60cda57f5cf6b58e47871ba66919
CMS Formulasi 2.07 XSS / CSRF / SQL Injection
Posted Oct 4, 2013
Authored by Sarahma Security

CMS Formulasi version 2.07 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 31236b0c0d88696852ea9249ac4edc8b201e44dc4205034acd8af58e87dd4bf8
SoftHSM 1.3.5
Posted Oct 4, 2013
Authored by Rickard Bellgrim | Site wiki.opendnssec.org

SoftHSM is an implementation of a cryptographic store accessible through a PKCS#11 interface. You can use it to explore PKCS#11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM uses Botan for its cryptographic operations.

Changes: Improved handling of a busy database. Adds -Wall -Werror flags and fixes the warnings. Fixes more warnings on EPEL.
tags | library
systems | unix
SHA-256 | 28b5062a13450faf6099fcb82d25d21f0ac7d202ba31ec85e943246cdcf87ebd
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close