exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-06-30

Carberp Web Panel C2 Backdoor Remote PHP Code Execution
Posted Jun 30, 2013
Authored by Luis Santana, bwall, Steven K | Site metasploit.com

This Metasploit module exploits backdoors that can be sighted all over the leaked source code of the Carberp botnet C2 Web Panel.

tags | exploit, web
SHA-256 | 8e430225d99c7af533d24ccc317c9b9e1fefd8bc6b0785c793924b5d5a2741a0
Xorbin Analog Flash Clock 1.0 For Joomla XSS
Posted Jun 30, 2013
Authored by Prakhar Prasad, Rafay Baloch

Xorbin Analog Flash Clock plugin version 1.0 for Joomla suffers from a flash-based cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-4692
SHA-256 | db191d2a15c32b3a82e6a57b0ed829bbbb56a36958154f8a7150bc0dc3f1d59f
Xorbin Digital Flash Clock 1.0 For WordPress XSS
Posted Jun 30, 2013
Authored by Prakhar Prasad, Rafay Baloch

Xorbin Digital Flash Clock plugin version 1.0 for WordPress suffers from a flash-based cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-4693
SHA-256 | 52281822ff4a323761052080687530ded283d887d7b6d4c7707929f84c1ef54d
Xorbin Analog Flash Clock 1.0 For WordPress XSS
Posted Jun 30, 2013
Authored by Prakhar Prasad, Rafay Baloch

Xorbin Analog Flash Clock plugin version 1.0 for WordPress suffers from a flash-based cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-4692
SHA-256 | 4095a10cc00eeeb24a4ebbf0d3b8293fa9afb1e65add0ab3198f35283253d6ca
C.P.Sub 4.5 Privilege Escalation
Posted Jun 30, 2013
Authored by Chako

C.P.Sub versions 4.5 and below allows for administrative access escalation by the simple tweak of a user-supplied parameter.

tags | exploit, bypass
SHA-256 | 14729e57eccb98c1c5eea6f86f24ddce13fd2cdb43c82ac103ce384009b6a37a
Vatican Cross Site Scripting
Posted Jun 30, 2013
Authored by Andrea Menin

The Vatican vaticanstate.va webcam page suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a8894f1b1dd5890c9866d2426fdde5123f882692bbd5b0645b0fea35e9fbd003
Atomymaxsite Shell Upload
Posted Jun 30, 2013
Authored by Iranian_Dark_Coders_Team

Sites powered by ATOMYMAXSITE appear to suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | d379da817df77aaeadcc98a86b9e17fdf60ec6d4b1849e11e8c49f2fe3c406da
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close