Twenty Year Anniversary
Showing 1 - 8 of 8 RSS Feed

Files Date: 2016-05-14

JVC XSS / CSRF / Header Injection / Weak Credentials
Posted May 14, 2016
Authored by OrwellLabs | Site orwelllabs.com

Various JVC products suffer from having weak and poorly protected credentials, cross site request forgery, cross site scripting, header injection, and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure, csrf
MD5 | 52d4ba7912d71b01846cc787feb159b5
eXtplorer 2.1.9 Path Traversal
Posted May 14, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

eXtplorer version 2.1.9 suffers from a traversal vulnerability.

tags | exploit
advisories | CVE-2016-4313
MD5 | e20732fe629ba90a2b27f0d331fd81c1
Microsoft Security Bulletin Revision Increment For May, 2016
Posted May 14, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment.

tags | advisory
MD5 | 072a21c0fe060eb1ebdf2845f0044839
tmcdos dns_dhcp SQL Injection
Posted May 14, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The tmcdos dns_dhcp web interface suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | 1f92e2ec9f06ac393a9ce9956510a9d2
CakePHP Framework 3.2.4 IP Spoofing
Posted May 14, 2016
Authored by Dawid Golunski

CakePHP Framework versions 3.2.4 and below suffer from a vulnerability that allows users to spoof the source IP address logged by the server.

tags | exploit, spoof
MD5 | e42211c031063b646edfbfdecb046f33
runAV mod_security Remote Command Execution
Posted May 14, 2016
Authored by R-73eN

runAV with mod_security suffers from a command injection vulnerability that leads to privilege escalation providing the clamscan binary is setuid.

tags | exploit
MD5 | 82bf21fa4728bcae3e39e3a7b1c04488
NRSS News Reader 0.3.9-1 Stack Buffer Overflow
Posted May 14, 2016
Authored by Juan Sacco

NRSS News Reader version 0.3.9-1 suffers from a buffer overflow vulnerability which allows local attackers to obtain privileged access when exploited.

tags | exploit, overflow, local
MD5 | 17a87d5c6cc7da4395c671f07398233c
Hipchat Server Remote Code Execution / File Read / SSRF
Posted May 14, 2016
Authored by David Black

HipChat Server versions below 2.0 build 1.4.1 suffer from vulnerabilities including code execution, insufficient shell characters, file deletion, file moving, local file read, and Server-Side Request Forgery.

tags | advisory, shell, local, vulnerability, code execution
MD5 | a3b14e31cc25931dcf411d38eb966532
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    21 Files
  • 17
    Jul 17th
    15 Files
  • 18
    Jul 18th
    15 Files
  • 19
    Jul 19th
    17 Files
  • 20
    Jul 20th
    11 Files
  • 21
    Jul 21st
    1 Files
  • 22
    Jul 22nd
    1 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close