exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 44 of 44 RSS Feed

Files from Cody Sixteen

Email address610code at gmail.com
First Active2016-05-30
Last Active2024-04-16
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
SHA-256 | c13f3213213baa28e248e4dc73e332bc336b5d187686a95ad2ef8b57a7b36938
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
SHA-256 | 9876efa02a9403b13e3814ee5a4409950bf50bd73e0e3c6f43ee673c60841a3e
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
SHA-256 | 8cd9a562fc422fbab693c7375a6d77afbff17c5e7e25cd997d8290beae82bbe2
multiOTP 5.0.4.4 Remote Code Execution
Posted Apr 2, 2020
Authored by Cody Sixteen

This whitepaper documents a walk through that describes the steps taken to identify a remote code execution vulnerability in multiOTP version 5.0.4.4.

tags | exploit, remote, code execution
SHA-256 | 4732ae6117764a5cac9dd84f3d79ef6065f0a8c5a22085a25d924acb3a87756e
Zen Load Balancer 3.10.1 Remote Code Execution
Posted Mar 30, 2020
Authored by Cody Sixteen

Zen Load Balancer version 3.10.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 29c20561040a95db93c50db27ac160b719fa168e3166212b7e43c1092858f647
Pentesting Zen Load Balancer
Posted Mar 30, 2020
Authored by Cody Sixteen

This whitepaper is a quick tutorial on pentesting the Zen load balancer.

tags | paper
SHA-256 | 8ebf09c3635ca8278455d6f94536ff8b1c047cc31e15ee939200ecc06d560253
VA MAX 8.3.4 Remote Code Execution
Posted Feb 11, 2019
Authored by Cody Sixteen

VA MAX version 8.3.4 suffers from a post-authentication remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 83895e02490abd5dff21baf3e6cb7ef84abf36fa23f4bc7a4401f14daf917e92
Zoho ManageEngine Applications Manager 13 SQL Injection
Posted Nov 6, 2017
Authored by Cody Sixteen

Zoho ManageEngine Applications Manager version 13 suffers from multiple post-authentication remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2017-16542, CVE-2017-16543
SHA-256 | e79e67b62c5a3db8d9973fd1eb18a3c66ece70790cdf160b8cd6d21bd4354906
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
Posted Aug 18, 2017
Authored by Mehmet Ince, Cody Sixteen | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. WizardSetting_sys.imss endpoint takes several user inputs and performs LAN settings. After that it use them as argument of predefined operating system command without proper sanitation. It's possible to inject arbitrary commands into it. InterScan Messaging Security prior to 9.1.-1600 affected by this issue.

tags | exploit, web, arbitrary, root
SHA-256 | 50f31837beea28b6c9830ae6763884d12cce54426a4afac257f09c46574b30b4
ModX CMS Proof Of Concept Shell Upload
Posted May 31, 2017
Authored by Cody Sixteen

This proof of concept code shows how manager functionality can be abused in ModX CMS to upload a shell.

tags | exploit, shell, proof of concept
SHA-256 | 716aad67ffbd1e03ee636500fb005acbd2d5d6ac6569cc879ee02aa5114964b1
RealPlayer 18.1.7.344 Memory Corruption
Posted May 29, 2017
Authored by Cody Sixteen

RealPlayer version 18.1.7.344 suffers from memory corruption vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 34735884e57bf041f2ef2d6a51aff4eac035924e94a271abafaa53b0e7f52ed3
Joomla 3.x Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrator functionality can be abused in Joomla to upload a shell.

tags | exploit, shell, proof of concept, file upload
SHA-256 | 87a728b87ac587ae5b8e6ee3b500ceb0624fe986b8ed1bfd032bd116ff3c79a3
DokuWiki Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrative functionality can be abused in DokuWiki to upload a shell.

tags | exploit, shell, proof of concept
SHA-256 | 898865a317bcc77f576b4558759df3d84a4cbe466095de9d767b2e148a4909db
Concrete5 Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how functionality can be abused in Concrete5 to upload a shell.

tags | exploit, shell, proof of concept
SHA-256 | d3561f919f95a84828625cf5bd9e0f2bdfc5da586f3e00580cf1cd43a8d35f83
Irfan View 4.42 Crashes
Posted Jul 14, 2016
Authored by Cody Sixteen

Irfan View version 4.42 suffers from multiple crash vulnerabilities.

tags | exploit, denial of service, vulnerability
systems | linux
SHA-256 | d8b34f2ac98cb14fe582e633c1a7fd986c688540153b7c02ef5cf5d86bfdb7fa
Microsoft Outlook 2010 WriteAV Crash
Posted Jul 7, 2016
Authored by Cody Sixteen

Microsoft Outlook 2010 WriteAV proof of concept crash exploit.

tags | exploit, proof of concept
SHA-256 | f6751c5e9616b27ce38fd40c1a3c8f84b8face9869f05783abe3be237cbaaa9e
Internet Explorer 8 User Mode Write AV
Posted Jun 1, 2016
Authored by Cody Sixteen

Microsoft Internet Explorer 8 user mode write AV proof of concept code.

tags | exploit, proof of concept
SHA-256 | add8845ff9694555ffb68dbb14ce822122e3cf8e5c41c12d6dd8149806a65b9e
Microsoft Office 2010 Publisher Denial Of Service
Posted May 30, 2016
Authored by Cody Sixteen

Publisher in Microsoft Office 2010 suffers from three denial of service vulnerabilities that can result in a crash.

tags | exploit, denial of service, vulnerability
systems | windows
SHA-256 | 92d4806502ddbfb861c44b73ab19354dd02252559e04a185f6e8ea97c63c7f33
Microsoft Internet Explorer 8 Divide By Zero Proof Of Concept
Posted May 30, 2016
Authored by Cody Sixteen

Microsoft Internet Explorer divide by zero proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 0e70e4c082f946f359c63b9b6a4e594dc50965980351a81ff1b82297a5f7c2e7
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close