what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-06-20

Symphony CMS 2.6.7 Session Fixation
Posted Jun 20, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symphony CMS version 2.6.7 suffers from a session fixation vulnerability.

tags | exploit
advisories | CVE-2016-4309
SHA-256 | fcce378e883b3ff540a27cf8149e463a3ba4d2169e61ae0c586947e9fca1ab32
ACROS Security 0patch 2016.05.19.539 Privilege Escalation
Posted Jun 20, 2016
Authored by LiquidWorm | Site zeroscience.mk

ACROS Security 0patch (0PatchServicex64.exe) version 2016.05.19.539 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
SHA-256 | 9a8848b1430ec19b65dbe9a141262be69f8b87933e3836021c166945023d5a4a
Tomabo M3U SEH Based Stack Buffer Overflow
Posted Jun 20, 2016
Authored by yokoacc, rungga_reksya, rahmat_nurfauzi, nudragn | Site metasploit.com

This Metasploit module exploits a stack over flow in Tomabo MP4 Player versions 3.11.6 and below. When the application is used to open a specially crafted m3u file, an buffer is overwritten allowing for the execution of arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 104a2cf0362a9f21257ea0a0cc45857f18d63ab96ed465e6584382172fbc0a86
Airia Shell Upload
Posted Jun 20, 2016
Authored by HaHwul

Airia suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | cfc1420f67c56a2235a22635d3daa66b50a7b6904e1827ff6ed27bcb1c81d10b
Airia Cross Site Request Forgery
Posted Jun 20, 2016
Authored by HaHwul

Airia suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8f3f556160822259eba932628ea1a80bf0cd9c16fafde59cea0d98a3c230bee0
Airia Cross Site Scripting
Posted Jun 20, 2016
Authored by HaHwul

Airia suffers from reflective and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b2c74fe4d3d81fabd1f0139fc587bd7251d6c558f0c816513aa1c4c186deb7f1
CMS Elevel 1.0 Cross Site Scripting / SQL Injection
Posted Jun 20, 2016
Authored by T3NZOG4N, Mojtaba MobhaM, FireKernel

CMS Elevel version 1.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 8f93f4639da165c7d40f31f0e5385ee75c3040bae450f8b5fc82bc0d690a199d
WordPress Premium SEO Pack 1.9.1.3 wp_options Overwrite
Posted Jun 20, 2016
Authored by wp0Day.com

WordPress Premium SEO Pack plugin version 1.9.1.3 wp_options overwrite exploit.

tags | exploit
SHA-256 | 8a55f1d9460eb33d0d116749843de8ab238c20eac093166d53268fe5866c2c2b
dbdiff Cross Site Scripting
Posted Jun 20, 2016
Authored by HaHwul

dbdiff suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | deb9dbf9c5132aac890cdebf0b63c75e07bd93380bca4dbb8e7a98efd031ee6d
Windows Custom Font Disable Policy Bypass
Posted Jun 20, 2016
Authored by Google Security Research, forshaw

It is possible to bypass the ProcessFontDisablePolicy check in win32k to load a custom font from an arbitrary file on disk even in a sandbox.

tags | exploit, arbitrary
systems | linux
advisories | CVE-2016-3219
SHA-256 | e53ce21674ff108088fda4624124e065ad3b50d11954813a258023ebc7b8704e
Windows gdi32.dll Out-Of-Bounds Read / Memory Disclosure
Posted Jun 20, 2016
Authored by Google Security Research, mjurczyk

gdi32.dll in Microsoft Windows suffers from a heap-based out-of-bounds reads / memory disclosure vulnerability in multiple DIB-related EMF record handlers.

tags | exploit
systems | linux, windows
advisories | CVE-2016-3216
SHA-256 | 599e60fc217ca238285ecc8ab338d17881e87aaf87e0941898705824b930c458
Windows Kernel ATMFD.DLL NamedEscape 0x250C Pool Corruption
Posted Jun 20, 2016
Authored by Google Security Research, mjurczyk

The Adobe Type Manager Font Driver (ATMFD.DLL) responsible for handling PostScript and OpenType fonts in the Windows kernel provides a channel of communication with user-mode applications via an undocumented gdi32!NamedEscape API call.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2016-3220
SHA-256 | 59929f0fa10d7193fd9b64ec3247eab0af43bf5e2900eabc5ec45b0d52b0f7bb
Linux ecryptfs Stack Overflow
Posted Jun 20, 2016
Authored by Jann Horn, Google Security Research

There is a stack overflow in Linux via ecryptfs and /proc/$pid/environ.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-1583
SHA-256 | a2027cead72d77f935e2469af1185bf388665e08efd098affb8819e227a002a7
Joomla BT Media 1.0 SQL Injection
Posted Jun 20, 2016
Authored by Mojtaba MobhaM

Joomla BT Media component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c218f6a31bc622d5737dbce05fe6ba1edeb71b219ce1e1ffb80a5c88bd7bf93e
Linux x86_64 execve Shellcode
Posted Jun 20, 2016
Authored by CripSlick

Linux x86_64 execve shellcode.

tags | shellcode
systems | linux
SHA-256 | b61d1f9c3fbca9e96d93b892f4689dae15dd879cf20b429fceece4638184fc73
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close