Exploit the possiblities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2016-05-14

JVC XSS / CSRF / Header Injection / Weak Credentials
Posted May 14, 2016
Authored by OrwellLabs | Site orwelllabs.com

Various JVC products suffer from having weak and poorly protected credentials, cross site request forgery, cross site scripting, header injection, and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure, csrf
MD5 | 52d4ba7912d71b01846cc787feb159b5
eXtplorer 2.1.9 Path Traversal
Posted May 14, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

eXtplorer version 2.1.9 suffers from a traversal vulnerability.

tags | exploit
advisories | CVE-2016-4313
MD5 | e20732fe629ba90a2b27f0d331fd81c1
Microsoft Security Bulletin Revision Increment For May, 2016
Posted May 14, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment.

tags | advisory
MD5 | 072a21c0fe060eb1ebdf2845f0044839
tmcdos dns_dhcp SQL Injection
Posted May 14, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The tmcdos dns_dhcp web interface suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | 1f92e2ec9f06ac393a9ce9956510a9d2
CakePHP Framework 3.2.4 IP Spoofing
Posted May 14, 2016
Authored by Dawid Golunski

CakePHP Framework versions 3.2.4 and below suffer from a vulnerability that allows users to spoof the source IP address logged by the server.

tags | exploit, spoof
MD5 | e42211c031063b646edfbfdecb046f33
runAV mod_security Remote Command Execution
Posted May 14, 2016
Authored by R-73eN

runAV with mod_security suffers from a command injection vulnerability that leads to privilege escalation providing the clamscan binary is setuid.

tags | exploit
MD5 | 82bf21fa4728bcae3e39e3a7b1c04488
NRSS News Reader 0.3.9-1 Stack Buffer Overflow
Posted May 14, 2016
Authored by Juan Sacco

NRSS News Reader version 0.3.9-1 suffers from a buffer overflow vulnerability which allows local attackers to obtain privileged access when exploited.

tags | exploit, overflow, local
MD5 | 17a87d5c6cc7da4395c671f07398233c
Hipchat Server Remote Code Execution / File Read / SSRF
Posted May 14, 2016
Authored by David Black

HipChat Server versions below 2.0 build 1.4.1 suffer from vulnerabilities including code execution, insufficient shell characters, file deletion, file moving, local file read, and Server-Side Request Forgery.

tags | advisory, shell, local, vulnerability, code execution
MD5 | a3b14e31cc25931dcf411d38eb966532
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close