what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 54,510 RSS Feed

Exploit Files

Artica Proxy 4.40 Code Injection
Posted Oct 11, 2024
Authored by indoushka

Artica Proxy version 4.40 suffers from a code injection vulnerability that provides a reverse shell.

tags | exploit, shell
SHA-256 | c1517d7efd5b58efb0947f3e574c94e4dff36e9127ec54ebd5658e96d60b3efb
ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Directory Traversal
Posted Oct 10, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.08.01 has a directory traversal vulnerability that can be exploited by an unauthenticated attacker to list the contents of arbitrary directories without reading file contents, leading to information disclosure of directory structures and filenames. This may expose sensitive system details, aiding in further attacks. The issue lies in the listFiles() function of the persistenceManagerAjax.php script, which calls PHP's readdir() function without proper input validation of the directory POST parameter.

tags | exploit, arbitrary, php, info disclosure
SHA-256 | 6fe5412f92cf9da09187b01562243fec9b9cf0b1251cbfd3a890fd1a773702c5
Palo Alto Networks GlobalProtect Local Privilege Escalation
Posted Oct 10, 2024
Authored by Johannes Greil, Michael Baer | Site sec-consult.com

Palo Alto Networks GlobalProtect versions 5.1.x, 5.2.x, 6.0.x, 6.1.x, 6.3.x and versions less than 6.2.5 suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2024-9473
SHA-256 | bdf5f12114d9810353407e9bf2aa69dff68a900d64bc056a6fe658b1f27ea756
Android GKI Kernels Use-After-Free
Posted Oct 10, 2024
Authored by Jann Horn, Google Security Research

Android GKI kernels contain broken non-upstream Speculative Page Faults MM code that can lead to use-after-free conditions.

tags | exploit, kernel
advisories | CVE-2023-20937
SHA-256 | 66f3d20525ff0676542d2ca32e25362978413e0665982d4a600608e52b0a2fcf
dav1d Integer Overflow / Out-Of-Bounds Write
Posted Oct 9, 2024
Authored by Google Security Research, Nick Galloway

There is an integer overflow in dav1d when decoding an AV1 video with large width/height. The integer overflow may result in an out-of-bounds write.

tags | exploit, overflow
advisories | CVE-2024-1580
SHA-256 | 2e6ee0c003e7075d02a19941dea59ff9838200ead28039478bb67d1a365c5bdc
ABB Cylon Aspect 3.08.01 calendarFileDelete.php Arbitrary File Deletion
Posted Oct 8, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.08.01 suffers from an arbitrary file deletion vulnerability. Input passed to the file parameter in calendarFileDelete.php is not properly sanitized before being used to delete calendar files. This can be exploited by an unauthenticated attacker to delete files with the permissions of the web server using directory traversal sequences passed within the affected POST parameter.

tags | exploit, web, arbitrary, php
SHA-256 | af2f7d68963611fa4772fa49e8fd86c81c3df85b1983689743ab1d4ffc0561a5
PHP-Nuke Top Module SQL Injection
Posted Oct 8, 2024
Authored by Emiliano Febbi

The Top module for PHP-Nuke versions 6.x and below 7.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 3a92ffde9b535fb265d6a04a22334f353b0ca9559e82557ef8693c270d32986f
Grav CMS 1.7.44 Server-Side Template Injection
Posted Oct 7, 2024
Authored by geniuszlyy | Site github.com

GenGravSSTIExploit is a proof of concept Python script that exploits an authenticated server-side template injection (SSTI) vulnerability in Grav CMS versions 1.7.44 and below. This vulnerability allows a user with editor permissions to execute OS commands on a remote server.

tags | exploit, remote, proof of concept, python
advisories | CVE-2024-28116
SHA-256 | 320840a574bd1e39d76e644a70206a220bf7e080390462bcc9fbdf69d6cd628a
Ruby-SAML / GitLab Authentication Bypass
Posted Oct 7, 2024
Authored by Synacktiv | Site github.com

This script exploits the issue noted in CVE-2024-45409 that allows an unauthenticated attacker with access to any signed SAML document issued by the IDP to forge a SAML Response/Assertion and gain access as any user on GitLab. Ruby-SAML versions below or equal to 12.2 and versions 1.13.0 through 1.16.0 do not properly verify the signature of the SAML Response.

tags | exploit, ruby
advisories | CVE-2024-45409
SHA-256 | d08713f2b53b8375bee1c935a8aa40df427334d91a9660f64086fe0c225c0c55
iTunes For Windows 12.13.2.3 Local Privilege Escalation
Posted Oct 7, 2024
Authored by mbog14 | Site github.com

This is a thorough write up of how to exploit a local privilege escalation vulnerability in iTunes for Windows version 12.13.2.3. Apple fixed this in version 12.13.3.

tags | exploit, local
systems | windows, apple
advisories | CVE-2024-44193
SHA-256 | d695b4f1b1028346552105f4ee8239edee8add156e7b797895b5d5337070f75f
ABB Cylon Aspect 3.08.00 syslogSwitch.php Remote Code Execution
Posted Oct 7, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect versions 3.08.00 and below suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the SYSLOG HTTP POST parameter called by the syslogSwitch.php script.

tags | exploit, web, arbitrary, shell, php
SHA-256 | bd108fa7ce900744b1676f5426423c1034cfcf86df1a6c72f006197b3c7c4616
ABB Cylon Aspect 3.08.01 caldavUtil.php Remote Code Execution
Posted Oct 7, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect versions 3.08.01 and below suffer from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the Footer HTTP POST parameter called by the caldavUtil.php script.

tags | exploit, web, arbitrary, shell, php
SHA-256 | 8a578a88dc628bdf9030f24dfeb5efed5a2916122d7b2c6617ee5215c5c7a0d4
ABB Cylon Aspect 3.08.00 setTimeServer.php Remote Code Execution
Posted Oct 7, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect versions 3.08.00 and below suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the timeserver HTTP POST parameter called by the setTimeServer.php script.

tags | exploit, web, arbitrary, shell, php
SHA-256 | 7a951ff7fa25dce192577e79009a2ecc161d07c5d3e93a4698034aee54606ea7
ABB Cylon Aspect 3.08.01 logYumLookup.php Unauthenticated File Disclosure
Posted Oct 7, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect versions 3.08.01 and below suffer from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the logFile GET parameter via the logYumLookup.php script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

tags | exploit, arbitrary, php
SHA-256 | 30c77f451b21a376551521dd035b5e49e0e8791bc964c67769f0111ef659c202
Book Recording App 2024-09-24 Cross Site Scripting
Posted Oct 7, 2024
Authored by Arif Ari

Book Recording App, as submitted on 2024-09-24, suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ca1768dbff94043ee01a0061583de80ca1685c784895cdca06b8f990a4ba4df4
OpenMediaVault 7.4.2-2 Code Injection
Posted Oct 7, 2024
Authored by indoushka

OpenMediaVault version 7.4.2-2 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | dee3901417baed652d3fc04ebaed8cad97b0a4d6b6b57d600f69ac46177f5cc4
Netis MW5360 Code Injection
Posted Oct 7, 2024
Authored by indoushka

Netis MW5360 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | 974dd984899b2411ba4ed106942c2a833ce6ac14b2289ac1294116a892fdc83a
Hikvision IP Camera Cross Site Request Forgery
Posted Oct 7, 2024
Authored by indoushka

Hikvision IP Cameras suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 048a62691fff8ca9559f3569ecda16c64e4b8fff10f2234edeffc362e6ec8528
GeoServer 2.25.1 Code Injection
Posted Oct 7, 2024
Authored by indoushka

GeoServer version 2.25.1 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | 425286b969561badddd4d4255537956eb91fd2c63a438e26b79b655873664851
Gambio Online Webshop 4.9.2.0 Code Injection
Posted Oct 7, 2024
Authored by indoushka

Gambio Online Webshop version 4.9.2.0 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | c8f9e04f80ca5f409461edae51290f96dd6f04c7856de1b8c387b3a5757ea858
ABB Cylon Aspect 3.07.02 Authenticated File Disclosure
Posted Oct 4, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.07.02 suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the file GET parameter through the downloadDb.php script is not properly verified before being used to download database files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

tags | exploit, arbitrary, php
SHA-256 | bdeb7b96ce0490816b5aff85c7d91a69137f224971e0d812190f2924733b54d4
TeamViewer Privilege Escalation
Posted Oct 4, 2024
Authored by Peter Gabaldon | Site github.com

Proof of concept code for a flaw in TeamViewer that enables an unprivileged user to load an arbitrary kernel driver into the system.

tags | exploit, arbitrary, kernel, proof of concept
advisories | CVE-2024-7479, CVE-2024-7481
SHA-256 | 8e84c906525cb3028d5e2434a5ce1ee9c2d79ef078f6024e17e16888fa959853
MD-Pro 1.0.76 Shell Upload / SQL Injection
Posted Oct 4, 2024
Authored by Emiliano Febbi

MD-Pro version 1.0.76 suffers from remote SQL injection and shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | b641856919de4d5b0a61bc35a8e30fb6042f78f529af33b52af81ec5d5f73c4e
Computer Laboratory Management System 2024 1.0 Cross Site Scripting
Posted Oct 4, 2024
Authored by nu11secur1ty

Computer Laboratory Management System 2024 version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1fcd86678b2635e2cdd7247396f54562591ba9b9d9952cdb8f0ee3191c2cbf7a
Acronis Cyber Infrastructure 5.0.1-61 Cross Site Request Forgery
Posted Oct 4, 2024
Authored by indoushka

Acronis Cyber Infrastructure version 5.0.1-61 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c2eceedb5e5bb0efa35e17bc56bd524328eb69b0a4975863b7ddd165b1b73695
Page 5 of 2,181
Back34567Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close