what you don't know can hurt you
Showing 1 - 25 of 28 RSS Feed

Files from Cody Sixteen

Email address610code at gmail.com
First Active2016-05-30
Last Active2020-04-09
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 9, 2020
Authored by Cody Sixteen

Symantec Web Gateway version 5.0.2.8 pre-authentication remote code execution exploit.

tags | exploit, remote, web, code execution
MD5 | 4626e1e8d0204fec4863f5b78c64b0a5
NagiosXL 5.6.11 orderby SQL Injection
Posted Apr 9, 2020
Authored by Cody Sixteen

NagiosXL version 5.6.11 post authentication orderby parameter remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | af00914d51be1605d7261a4e4640d262
Centreon 19.11 SQL Injection
Posted Apr 9, 2020
Authored by Cody Sixteen

Centreon version 19.11 post authentication acl_res_name parameter remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | dbfffa02418a8f8265e03ea289bcae42
NagiosXI 5.6.11 start / end / step Remote Code Execution
Posted Apr 9, 2020
Authored by Cody Sixteen

NagiosXI version 5.6.11 post authentication start, end, and step parameter remote code execution exploit.

tags | exploit, remote, code execution
MD5 | 03df490fde128bbcbed70d7a7cbbf943
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 9, 2020
Authored by Cody Sixteen

Symantec Web Gateway version 5.0.2.8 post authentication remote code execution exploit.

tags | exploit, remote, web, code execution
MD5 | c88d1355f7cf9690236ca64c4866aaac
NagiosXI 5.6.11 address Remote Code Execution
Posted Apr 9, 2020
Authored by Cody Sixteen

NagiosXI version 5.6.11 post authentication address parameter remote code execution exploit.

tags | exploit, remote, code execution
MD5 | 92ef7b4ba5ce159306931d3e4c660d97
Centreon 19.10-3.el7 SQL Injection
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.

tags | exploit, paper, remote, vulnerability, sql injection
MD5 | dbac0cf531ae47db48c0dc6c68b92930
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, vulnerability, code execution
MD5 | abc6efe48f42679d3df8d10a4ab60e49
ManageEngine 14 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.

tags | exploit, paper, remote, vulnerability, code execution
MD5 | 361d79554df5c1c70d3bd1a4ab11c9d7
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
MD5 | 73a519ae9906fa675e36f00d2ae34802
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
MD5 | e3a2193e793902cf582aa14cc8f1a1ee
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
MD5 | af4fa3179a109a0ef5f00713c259a926
multiOTP 5.0.4.4 Remote Code Execution
Posted Apr 2, 2020
Authored by Cody Sixteen

This whitepaper documents a walk through that describes the steps taken to identify a remote code execution vulnerability in multiOTP version 5.0.4.4.

tags | exploit, remote, code execution
MD5 | 168865d3c5de4d20e8f3595f40cf8679
Zen Load Balancer 3.10.1 Remote Code Execution
Posted Mar 30, 2020
Authored by Cody Sixteen

Zen Load Balancer version 3.10.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 8a94b04383ba5845668af5b40ea1572f
Pentesting Zen Load Balancer
Posted Mar 30, 2020
Authored by Cody Sixteen

This whitepaper is a quick tutorial on pentesting the Zen load balancer.

tags | paper
MD5 | 861099cc2be81725b83792a18b56b14b
VA MAX 8.3.4 Remote Code Execution
Posted Feb 11, 2019
Authored by Cody Sixteen

VA MAX version 8.3.4 suffers from a post-authentication remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 2f7f205175ffba97f02f89ae90c1840a
Zoho ManageEngine Applications Manager 13 SQL Injection
Posted Nov 6, 2017
Authored by Cody Sixteen

Zoho ManageEngine Applications Manager version 13 suffers from multiple post-authentication remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2017-16542, CVE-2017-16543
MD5 | 8115dc4d1bf7c179bd4ceb7ff2fb80df
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
Posted Aug 18, 2017
Authored by Mehmet Ince, Cody Sixteen | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. WizardSetting_sys.imss endpoint takes several user inputs and performs LAN settings. After that it use them as argument of predefined operating system command without proper sanitation. It's possible to inject arbitrary commands into it. InterScan Messaging Security prior to 9.1.-1600 affected by this issue.

tags | exploit, web, arbitrary, root
MD5 | 7eadfd94788e579c42212511e87507fe
ModX CMS Proof Of Concept Shell Upload
Posted May 31, 2017
Authored by Cody Sixteen

This proof of concept code shows how manager functionality can be abused in ModX CMS to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 4a9e82ae99c6a9dbf9554d110145a1a4
RealPlayer 18.1.7.344 Memory Corruption
Posted May 29, 2017
Authored by Cody Sixteen

RealPlayer version 18.1.7.344 suffers from memory corruption vulnerabilities.

tags | exploit, vulnerability
MD5 | 016abfd3fbb9683bb3cb4c4d5b774f1e
Joomla 3.x Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrator functionality can be abused in Joomla to upload a shell.

tags | exploit, shell, proof of concept, file upload
MD5 | 5342f1f41088abee2af959b87cbce235
DokuWiki Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrative functionality can be abused in DokuWiki to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 729d40f68a98bc4c5c3dc2afec215396
Concrete5 Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how functionality can be abused in Concrete5 to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 9745e0705ed0168941e97981a8f2ab5b
Irfan View 4.42 Crashes
Posted Jul 14, 2016
Authored by Cody Sixteen

Irfan View version 4.42 suffers from multiple crash vulnerabilities.

tags | exploit, denial of service, vulnerability
systems | linux
MD5 | e7ce29f5958f347be645b60ffc1c2f6a
Microsoft Outlook 2010 WriteAV Crash
Posted Jul 7, 2016
Authored by Cody Sixteen

Microsoft Outlook 2010 WriteAV proof of concept crash exploit.

tags | exploit, proof of concept
MD5 | 8fca4caab4b799a2c0731def5e034d03
Page 1 of 2
Back12Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close