exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from rungga_reksya

First Active2016-06-20
Last Active2017-04-05
Faveo Helpdesk Community 1.9.3 Cross Site Request Forgery
Posted Apr 5, 2017
Authored by yokoacc, rungga_reksya, AdyWikradinata, dvnrcy, dickysofficial

Faveo Helpdesk Community version 1.9.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2017-7571
SHA-256 | cd0d8d4fed589c32ca2b88da91232f66bb2ac0d6aab89fa7ac60b139e8b44512
HelpDEZK 1.1.1 CSRF / Code Execution
Posted Apr 5, 2017
Authored by yokoacc, rungga_reksya, AdyWikradinata, dvnrcy, dickysofficial

HelpDEZK version 1.1.1 suffers from code execution and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, code execution, csrf
advisories | CVE-2017-7446, CVE-2017-7447
SHA-256 | b1be2cf4dbd16239836335203cb6fa1fc408c6ddb11cbc022ff7903940e323cf
Pixie 1.0.4 Shell Upload
Posted Apr 2, 2017
Authored by rungga_reksya, dvnrcy, dickysofficial

Pixie version 1.0.4 suffers from a remote shell upload vulnerability

tags | exploit, remote, shell
advisories | CVE-2017-7402
SHA-256 | c8dc6ec9c40a10e2b5a4a3f97810cea8eecf5e1be2c61555f422a3bf91bb0e1a
Pixie 1.0.4 Cross Site Scripting
Posted Mar 29, 2017
Authored by rungga_reksya, dickysofficial

Pixie version 1.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1bfb97f0b476e0247458cce92c0e867e76225fb7c98585669be0eec4d91c07f8
b2evolution 6.8.8 Shell Upload
Posted Mar 14, 2017
Authored by yokoacc, rungga_reksya, dvnrcy

b2evolution version 6.8.8 Stable suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | bcba360e0afaf99a5a9d677e78872714b24473535a78eadf42daf7685e541faf
Fiyo CMS 2.0.6.1 Privilege Escalation
Posted Mar 11, 2017
Authored by rungga_reksya, dvnrcy

Fiyo CMS version 2.0.6.1 suffers from a privilege escalation vulnerability due to poor design with trusting the client to tell the server a user's role.

tags | exploit
advisories | CVE-2017-6823
SHA-256 | b35ba4375ac6032b51d855dd32273ed05f03948d1543bd12729c851fe5843b8f
Agora-Project 3.2.2 Cross Site Scripting
Posted Mar 8, 2017
Authored by yokoacc, rungga_reksya, AdyWikradinata

Agora-Project version 3.2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a2252fb99ebcf67cddcac5a545419ae7cc14ae33b48d9d6e2edcb8d5c507052f
Tomabo M3U SEH Based Stack Buffer Overflow
Posted Jun 20, 2016
Authored by yokoacc, rungga_reksya, rahmat_nurfauzi, nudragn | Site metasploit.com

This Metasploit module exploits a stack over flow in Tomabo MP4 Player versions 3.11.6 and below. When the application is used to open a specially crafted m3u file, an buffer is overwritten allowing for the execution of arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 104a2cf0362a9f21257ea0a0cc45857f18d63ab96ed465e6584382172fbc0a86
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close