Twenty Year Anniversary
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-08-04

NASdeluxe NDL-2400r 2.01.10 Command Injection
Posted Aug 4, 2016
Authored by Klaus Eisentraut

NASdeluxe NDL-2400r version 2.01.10 suffers from an OS command injection vulnerability.

tags | exploit
MD5 | a54e4ef9f9dbb4159433e8cb986c4c04
NUUO NVRmini2 / NVRsolo / Crystal And NETGEAR ReadyNAS Code Execution
Posted Aug 4, 2016
Authored by Pedro Ribeiro

NUUO NVRmini2 / NVRsolo / Crystal devices and NETGEAR ReadyNAS suffer from multiple security issues that result in remote code execution, backdoor access, buffer overflow, and various other vulnerabilities.

tags | exploit, remote, overflow, vulnerability, code execution
advisories | CVE-2016-5674, CVE-2016-5675, CVE-2016-5676, CVE-2016-5677, CVE-2016-5678, CVE-2016-5679, CVE-2016-5680
MD5 | f350ea6228b354cd0f926e9dd1d7e81b
D-Link NAS / DNS Cross Site Scripting
Posted Aug 4, 2016
Authored by Benjamin Daniel Mussler

D-Link NAS and DNS series devices suffer from a stored cross site scripting vulnerability leveraged via unauthenticated smb.

tags | exploit, xss
MD5 | ae15cf5cc4eeae0b63997a870834fb20
WordPress Count Per Day 3.5.4 Cross Site Scripting
Posted Aug 4, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Count Per Day plugin version 3.5.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a0e5071482543a251fcb0cfddc84b384
WordPress FormBuilder 1.05 Cross Site Scripting
Posted Aug 4, 2016
Authored by Securify B.V., Peter Ganzevles

WordPress FormBuilder version 1.05 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | be4a42ddd453f70dc3aaf7695a8c475c
K2 Joomla! Extension Cross Site Scripting
Posted Aug 4, 2016
Authored by Manuel Mancera

K2 Joomla! extension versions prior to 2.7.1 suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0695695ad3aef9d0638fc9d1c05f5a2f
WordPress Events Made Easy Cross Site Scripting
Posted Aug 4, 2016
Authored by Securify B.V., Job Diesveld

WordPress Events Made Easy plugin versions prior to 1.6.21 suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 1ada1d4be92f5a500e6b62470fb70afd
net2ftp 1.0 Cross Site Scripting
Posted Aug 4, 2016
Authored by Jacobo Avariento

net2ftp version 1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | bee2f7b8ff9add9779f1427cda93848b
FortiManager Malicious Script Insertion
Posted Aug 4, 2016
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FortiManager (Series) suffers from a bookmark script insertion vulnerability.

tags | exploit
MD5 | 120bbc5505ae0a8c7f518135ea988929
WordPress Count Per Day 3.5.4 Persistent Cross Site Scripting
Posted Aug 4, 2016
Authored by Securify B.V., Julien Rentrop

WordPress Count Per Day plugin version 3.5.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | bdd3a0df5f92bf478ab3a4ff83619245
Samsung Mobile Phone Telecom Denial Of Service
Posted Aug 4, 2016
Authored by 0xr0ot

Vulnerabilities in the SpamCall Activity components of the Samsung Telecom application can crash and reboot a device when a malformed serializable object is passed.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-6526, CVE-2016-6527
MD5 | 2d8e130dda2656e82b1e1f90ea793f43
FortiAnalyzer / FortiManager Cross Site Scripting
Posted Aug 4, 2016
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FortiAnalyzer and FortiManager suffer from a client-side cross site scripting vulnerability.

tags | exploit, xss
MD5 | 72cf0fc75eaa91b0eb206267ce5ab9ab
WordPress Yoast SEO Cross Site Scripting
Posted Aug 4, 2016
Authored by Hammad Shamsi

WordPress Yoast SEO plugin versions prior to 3.4.1 suffer from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 99a8d63a16620294f7c4403248c92fa5
NetNeedle Network-Based Steganography Tool
Posted Aug 4, 2016
Authored by John Ventura

NetNeedle provides for encrypted control channels and chat sessions that are disguised to look like other common network activity. It only transmits "decoy" data in the "payload" section of any packet, so forensic analysts will only see packets that look identical to ordinary ping or HTTP GET requests. The actual data is encoded in IP headers in fields that typically contain random values. In addition to evasion features, penetration testers can use this tool to maintain control over servers in environments with highly restrictive access lists. Because NetNeedle subverts expectations surrounding network traffic, it enables users to set up back doors that use simple ICMP packets or TCP ports that are already in use. Administrators who believe that they are safe due to "principle of least privilege" access control lists or who believe that ICMP ping is harmless will find themselves sadly mistaken.

tags | tool, web, tcp
systems | unix
MD5 | d0e19254115c06111c8b2721ecff9f2c
Joomla Video Flow 1.1.5 SQL Injection
Posted Aug 4, 2016
Authored by xBADGIRL21

Joomla Video Flow component versions 1.1.3 through 1.1.5 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 249796b7f6c87a68e96a6e41fe3d46b8
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    5 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close