exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2013-12-08

TheHostingTool 1.2.x Cross Site Scripting
Posted Dec 8, 2013
Authored by DevilScreaM

TheHostingTool version 1.2.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b8ff28cc399a94a530cfdfd2f9d7d3a6540e7c41b39dc57e51fa08a0112da645
LFI Exploiter 1.1
Posted Dec 8, 2013
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

Changes: Various updates.
tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | 7ce9af081371d3aac6a99db29aef3d8887c46d12ee280d8061b70faa5799c0f2
WordPress Photosmash Shell Upload
Posted Dec 8, 2013
Authored by Ashiyane Digital Security Team

WordPress Photosmash plugin suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | f3d3fc56e3bf61eb9e674dc6ae973601f1ef3fb057e3103babced81c67ec6f72
WordPress FormCraft Premium SQL Injection
Posted Dec 8, 2013
Authored by Ashiyane Digital Security Team

WordPress FormCraft Premium plugin suffers from a remote SQL injection vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, sql injection
SHA-256 | 2d9d0b60b3915fab78e22b6c8d2bffd4ca8c0b8f9667e42b5debc52b781d0349
Joomla Flexicontent Remote Code Execution
Posted Dec 8, 2013
Authored by Rafay Baloch, Deepankar Arora

Joomla Flexicontent component suffers from a code execution vulnerability due to the inclusion of phpthumb.

tags | exploit, code execution
SHA-256 | c420d44bcbccfa07f1cc718d8e71b7f4694db8ff878f20b384431b23ab5c659b
ZippyYum 3.4 Insecure Data Storage
Posted Dec 8, 2013
Authored by Daniel E. Wood

Subway Ordering for California (ZippyYum) version 3.4 suffers from an insecure data storage vulnerability. The application stores sensitive data insecurely to cache files located within ../Caches/com.ZippyYum.SubwayOC/ directory on the device.

tags | exploit
advisories | CVE-2013-6986
SHA-256 | 1c75b1db4256cdea358d879ada7fbd0109d71b901133ca6deaf8588bd78926c8
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close