exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2013-12-08 to 2013-12-09

TheHostingTool 1.2.x Cross Site Scripting
Posted Dec 8, 2013
Authored by DevilScreaM

TheHostingTool version 1.2.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b8ff28cc399a94a530cfdfd2f9d7d3a6540e7c41b39dc57e51fa08a0112da645
LFI Exploiter 1.1
Posted Dec 8, 2013
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

Changes: Various updates.
tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | 7ce9af081371d3aac6a99db29aef3d8887c46d12ee280d8061b70faa5799c0f2
WordPress Photosmash Shell Upload
Posted Dec 8, 2013
Authored by Ashiyane Digital Security Team

WordPress Photosmash plugin suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | f3d3fc56e3bf61eb9e674dc6ae973601f1ef3fb057e3103babced81c67ec6f72
WordPress FormCraft Premium SQL Injection
Posted Dec 8, 2013
Authored by Ashiyane Digital Security Team

WordPress FormCraft Premium plugin suffers from a remote SQL injection vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, sql injection
SHA-256 | 2d9d0b60b3915fab78e22b6c8d2bffd4ca8c0b8f9667e42b5debc52b781d0349
Joomla Flexicontent Remote Code Execution
Posted Dec 8, 2013
Authored by Rafay Baloch, Deepankar Arora

Joomla Flexicontent component suffers from a code execution vulnerability due to the inclusion of phpthumb.

tags | exploit, code execution
SHA-256 | c420d44bcbccfa07f1cc718d8e71b7f4694db8ff878f20b384431b23ab5c659b
ZippyYum 3.4 Insecure Data Storage
Posted Dec 8, 2013
Authored by Daniel E. Wood

Subway Ordering for California (ZippyYum) version 3.4 suffers from an insecure data storage vulnerability. The application stores sensitive data insecurely to cache files located within ../Caches/com.ZippyYum.SubwayOC/ directory on the device.

tags | exploit
advisories | CVE-2013-6986
SHA-256 | 1c75b1db4256cdea358d879ada7fbd0109d71b901133ca6deaf8588bd78926c8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close