exploit the possibilities
Showing 51 - 57 of 57 RSS Feed

Files Date: 2015-02-09 to 2015-02-10

Exploit Sources Part One
Posted Feb 9, 2015
Authored by Florian MINDZSEC

This paper is simply a large collection of code snippets that can be leveraged when building/designing exploits.

tags | paper
MD5 | d986ae9d51deb20b1c1f4b00488896a4
WordPress Mobile Domain 1.5.2 Cross Site Request Forgery / Cross Site Scripting
Posted Feb 9, 2015
Authored by Morten Nortoft, Kenneth Jepsen, Mikkel Vej

WordPress Mobile Domain plugin version 1.5.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 6ff937082b31b9707f8cfff02624792a
ZTE Datacard Telecom MF626 Modem Privilege Escalation
Posted Feb 9, 2015
Authored by Hadji Samir

ZTE Datacard Telecom MF626 Modem (PCW_TNZNZLV1.0.0B02) suffers from a local privilege escalation vulnerability.

tags | exploit, local
MD5 | eaaaedcc4144b55eb8f8c75db397d11e
Microsoft Internet Explorer Universal XSS Proof Of Concept
Posted Feb 9, 2015
Authored by bhdresh

Proof of concept demonstration code for the universal cross site scripting vulnerability that affects Microsoft Internet Explorer as defined in CVE-2015-0072.

tags | exploit, xss, proof of concept
advisories | CVE-2015-0072
MD5 | 099fe37d9fc81b2fd829178163bc7ae3
Sinopec Group Cross Site Scripting
Posted Feb 9, 2015
Authored by Nicholas Lemonias

Sinopec Group suffers from multiple cross site scripting and HTML injection vulnerabilities. They have been notified and have not responded to the author.

tags | exploit, vulnerability, xss
MD5 | 58c94ea23996f94f1aaf1bb552d00cd8
Chamilo LMS 1.9.8 Blind SQL Injection
Posted Feb 9, 2015
Authored by Kacper Szurek

Chamilo LMS version 1.9.8 suffers from remote blind SQL injection and cross site request forgery vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
MD5 | 166b0596ea9e0b2124e561c9a5ec7f05
StaMPi Local File Inclusion
Posted Feb 9, 2015
Authored by e . V . E . L

Sites designed by StaMPi appear to suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 36f165b732543b6f500111b3e80ac278
Page 3 of 3
Back123Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    7 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close