what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2014-04-04

ASUS RT-AC68U Cross Site Scripting
Posted Apr 4, 2014
Authored by Joaquim Brasil de Oliveira

ASUS RT-AC68U web management interface suffers from a reflective cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 7ba8e8486a3d4055ad7a78d96b2f3cb20a29f14fd45f7d1245bd8fc10e936f97
ASUS RT-AC68U Remote Command Execution
Posted Apr 4, 2014
Authored by Joaquim Brasil de Oliveira

ASUS RT-AC68U web management interface suffers from a remote command execution vulnerability.

tags | exploit, remote, web
SHA-256 | 7b176b54c84640f3cc5a4774305b03a76850a6c9f8faf88663140ab2d62a9bac
PIR Workshop 2014 Call For Papers
Posted Apr 4, 2014
Site cs-sys-1.uis.georgetown.edu

Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security, also known as PIR Workshop 2014, has announced its Call For Papers. It will be held July 11, 2014 in Gold Coast, Australia.

tags | paper, conference
SHA-256 | e1e303b707135673aefdb374795d570799f7949384c538a1e28b2aaadaa6ed24
Google Voice Private/Unknown Number Disclosure
Posted Apr 4, 2014
Authored by Simo Ben Youssef | Site morxploit.com

Google Voice discloses private and unknown numbers that have called you through its search functionality. This exploit helps perform a brute force attack against your contact list.

tags | exploit
SHA-256 | 2739f68f433c91007b9fb24f4e39edbf7eaefc8f5952bef0152ce3eac0539310
ECE Projects Cross Site Scripting
Posted Apr 4, 2014
Authored by Wang Jing

ECE Projects suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | be7a6e80f2bcf9b5552f29fecc0f7f219330cf62dd242782560185fb34bb6131
WhatsApp Database Extraction
Posted Apr 4, 2014
Authored by Monendra Sahu

This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.

tags | paper
SHA-256 | 68ad521e10670bbb65c0d7b97ed8b497b83fd054c87bf2fe62d0596ebb035636
NCCGroup EasyDA Credential Disclosure
Posted Apr 4, 2014
Authored by 0a29406d9794e4f9b30b3c5d6702c708

NCCGroup EasyDA suffers from a credential disclosure vulnerability due to misuse of /tmp.

tags | exploit
SHA-256 | 5b7ef0d48812b65b840f408b3ca2c5a9a046d447cc42215e356f33637313da7a
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close