exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-12-09

Geeklog 2.1.0 Command Injection
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

Geeklog version 2.1.0 suffers from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | 9862cfda9e37e8491628321364f663ba55f0f6c354b2b080cdc177f023d9abc9
phpwcms 1.7.9 Code Execution
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

phpwcms version 1.7.9 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | cd56fa80d63aceb3a22a492c868c6e092fa4610b513cc94b467a08a82adb923a
CodoForum 3.4 Cross Site Scripting
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

CodoForum version 3.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 08b398c865df0e4a28a1609ae30f8501dbf54ccaad37e409beaaf451d588213b
Geeklog 2.1.0 Command Injection
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

Geeklog version 2.1.0 remote command injection exploit.

tags | exploit, remote
SHA-256 | 787ba2b70d8b44c6755f398d14b0ee82b5849a076df078cf40da972729cb0371
4images 1.7.11 Code Execution
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

4images version 1.7.11 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | 3793a0088de878f1cdc70c69b6eb9f2bb9bce1325703390f91737ebb4854c8f1
4images 1.7.11 Code Execution
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

4images version 1.7.11 code execution proof of concept exploit.

tags | exploit, code execution
SHA-256 | 7eccaedc5b4e1b203a89329c72edcc441608199f3d846dc9b66770c51e572ba2
phpwcms 1.7.9 Cross Site Request Forgery
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

phpwcms version 1.7.9 suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | a6f973066696b3e3532c0de5065f9492e0231780e8842fc6ee52f6c2bbf1ba37
4images 1.7.11 Path Traversal
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

4images version 1.7.11 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | c4757c716ab488a177508f9169af87ac53f3ef3126f3cfd083af1e9588a97ad8
Cacti 0.8.8f SQL Injection
Posted Dec 9, 2015
Authored by changzhao.mao

Cacti versions 0.8.8f and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-8369
SHA-256 | 9360ec416bde873ec1d7ef3ca752240e463cf1396011ebe65a86a035905bb4a3
Geeklog 2.1.0 Cross Site Scripting
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

Geeklog version 2.1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 24d6c11f6838af6a04a17e76fc68f30c3c957ca0a5967139c090b0cd44daf6a9
4images 1.7.11 SQL Injection
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

4images version 1.7.11 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29e49a89ef6936496101fcd56ffc45b506e9814af1222936fc7634b8d76f141f
4images 1.7.12 Cross Site Scripting
Posted Dec 9, 2015
Authored by Tim Coen | Site curesec.com

4images version 1.7.12 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e29705c77e725464b6e9ceec32238f33b46902963af3d0422c3583435a6b0654
Microsoft Windows Media Center Incorrectly Resolved Reference
Posted Dec 9, 2015
Authored by Core Security Technologies, Francisco Falcon

Core Security Technologies Advisory - The 'application' tag in Microsoft Windows Media Center link files (.mcl extension) can include a 'run' parameter, which indicates the path of a file to be launched when opening the MCL file, or a 'url' parameter, which indicates the URL of a web page to be loaded within the Media Center's embedded web browser. A specially crafted MCL file having said 'url' parameter pointing to the MCL file itself can trick Windows Media Center into rendering the very same MCL file as a local HTML file within the Media Center's embedded web browser.

tags | exploit, web, local
systems | windows
advisories | CVE-2015-6127
SHA-256 | 9799e326c07a7ab71d9ef358d6f4d5e6a701d96b2706e59c7ebca20a69575734
Red Hat Security Advisory 2015-2589-01
Posted Dec 9, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2589-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap. A local attacker could potentially use this flaw to execute arbitrary code on the system. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data.

tags | advisory, arbitrary, local, info disclosure
systems | linux, redhat, osx
advisories | CVE-2013-7423, CVE-2015-1472, CVE-2015-1473, CVE-2015-1781, CVE-2015-5277
SHA-256 | 500d94725a7bca027910198d11bcaf63c36b7385c61ae995036c7436f222d112
Red Hat Security Advisory 2015-2587-01
Posted Dec 9, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2587-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel.

tags | advisory, denial of service, x86, kernel
systems | linux, redhat
advisories | CVE-2015-2925, CVE-2015-5307, CVE-2015-7613
SHA-256 | 7c10b5b27343af2c74bf31bd63e001e77554ed3df9654b75aad0b83c56e51efc
LG Nortel Disclosure / Insecure Configuration / DoS
Posted Dec 9, 2015
Authored by Karn Ganeshen

LG Nortel ADSL modems with software version 3.04L.02V.sip._LE9500.dspApp3341A2pB022f.d19e suffer from authorization flaws, information disclosure, insecure configuration, and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, info disclosure
SHA-256 | 07c137c52ba038e547265ff65850d81997d590daad3e58b85cea0d0e33cf7bb3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close