exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Cristofaro Mune

Email addressprivate
First Active2009-09-07
Last Active2010-07-15
View User Profile
D-Link DAP-1160 formFilter Buffer Overflow
Posted Jul 15, 2010
Authored by Cristofaro Mune | Site icysilence.org

A buffer overflow condition can be triggered on the D-Link DAP-1160 by setting URL filtering for an overly long URL, leading to possible arbitrary code execution or denial of service. Successful authentication is required in order to exploit the vulnerability, but attackers can leverage other vulnerabilities for achieving unauthenticated remote exploitation.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability, code execution
SHA-256 | bd3ea2fdf1b138ba8150e58e89eabdecdbbee7ee5b621500a372f19db8a7f868
D-Link DAP-1160 Authentication Bypass
Posted Jun 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The D-Link DAP-1160 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | a9f5cea857a1666b127ea7343b56365f2741ec2153b1da2c5d7ff03654988c02
D-Link DAP-1160 Unauthenticated Remote Configuration
Posted Jun 29, 2010
Authored by Cristofaro Mune | Site icysilence.org

Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.

tags | exploit, remote
SHA-256 | d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
Linksys WAP54Gv3 debug.cgi Cross Site Scripting
Posted Jun 25, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 suffers from a cross site scripting vulnerability in debug.cgi.

tags | exploit, cgi, xss
SHA-256 | 294313708cbc83d56122cedaf08f5a02cddf5080987bfeafe6d1d13f7fe35f20
Linksys WAP54Gv3 Remote Debug Root Shell
Posted Jun 9, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Linksys WAP54Gv3 has a debug interface allowing for the execution of root privileged shell commands. Hardcoded credentials, that cannot be changed by user, can be used for accessing the debug interface.

tags | exploit, shell, root
SHA-256 | fdf38433a8997957918a85f42b989155a632e3f26c1a3e0c4b124196a974e81a
Netgear WG602v4 Saved Password Stack Overflow
Posted May 30, 2010
Authored by Cristofaro Mune | Site icysilence.org

The Netgear WG602v4 suffers from a saved password stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 43880da74509f3b5b9103626adbc669276aacebb54cf3a964bf94e7a2dffa3a0
Pidgin IRC TOPIC Message Denial Of Service
Posted Sep 7, 2009
Authored by Cristofaro Mune | Site icysilence.org

Pidgin version 2.6.1 suffers from a remote denial of service vulnerability when receiving a malformed IRC TOPIC message from a malicious IRC server.

tags | advisory, remote, denial of service
advisories | CVE-2009-2703
SHA-256 | 7ab8b43ac2c2acb3ad6eba05eb13a7a79ce2e4e84598528d24915d411c6ce887
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close