exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52,911 RSS Feed

Exploit Files

ElkArte Forum 1.1.9 Remote Code Execution
Posted May 27, 2024
Authored by tmrswrr

ElkArte Forum version 1.1.9 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | a997e5df0996863611526f71121ce8640064994c237493d32774c3f309e05c10
Jcow Social Network Cross Site Scripting
Posted May 24, 2024
Authored by tmrswrr

Jcow Social Networking versions 14.2 up to 16.2.1 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8ff452224b5c44a006c708f69ef20ee895de407da9b77ccc1fefea5c2352b824
4BRO Insecure Direct Object Reference / API Information Exposure
Posted May 24, 2024
Authored by Max Rull | Site sec-consult.com

4BRO versions prior to 2024-04-17 suffer from insecure direct object reference and API information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 64654958dfdf54f7bad8c42f7237049baba8465ad1f9ae64c3a99c61e5cee06b
Debezium UI 2.5 Credential Disclosure
Posted May 24, 2024
Authored by Ihsan Cetin, Hamza Kaya Toprak

Debezium UI version 2.5 suffers from a credential disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2024-28736
SHA-256 | de2d99cea1ff19deb945b14b659e76d382f5d57f316b7dc8c8aca3034d7435af
FleetCart 4.1.1 Information Disclosure
Posted May 23, 2024
Authored by CraCkEr

FleetCart version 4.1.1 suffers from an information leakage vulnerability.

tags | exploit, info disclosure
advisories | CVE-2024-5230
SHA-256 | df07d922d5e0bd6dd265072cc317d09e41fe1ae1fb85d9021d825906e9007061
NorthStar C2 Cross Site Scripting / Code Execution
Posted May 22, 2024
Authored by h00die, chebuya | Site metasploit.com

NorthStar C2, prior to commit 7674a44 on March 11 2024, contains a vulnerability where the logs page is vulnerable to a stored cross site scripting issue. An unauthenticated user can simulate an agent registration to cause the cross site scripting attack and take over a users session. With this access, it is then possible to run a new payload on all of the NorthStar C2 compromised hosts (agents), and kill the original agent. Successfully tested against NorthStar C2 commit e7fdce148b6a81516e8aa5e5e037acd082611f73 running on Ubuntu 22.04. The agent was running on Windows 10 19045.

tags | exploit, xss
systems | linux, windows, ubuntu
advisories | CVE-2024-28741
SHA-256 | e5fdc1eb511aee9e0ced55911325ab4ed7c9efe59d20347fc192d3a17a7fa844
AVideo WWBNIndex Plugin Unauthenticated Remote Code Execution
Posted May 22, 2024
Authored by Valentin Lobstein | Site metasploit.com

This Metasploit module exploits an unauthenticated remote code execution vulnerability in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the submitIndex.php file, where user-supplied input is passed directly to the require() function without proper sanitization. By exploiting this, an attacker can leverage the PHP filter chaining technique to execute arbitrary PHP code on the server. This allows for the execution of commands and control over the affected system. The exploit is particularly dangerous because it does not require authentication, making it possible for any remote attacker to exploit this vulnerability.

tags | exploit, remote, arbitrary, php, code execution
advisories | CVE-2024-31819
SHA-256 | 7df90df7e75927e09777170cc36a4823a5062bc6e077056564aea5f7a6ba8b7f
Chat Bot 1.0 SQL Injection
Posted May 22, 2024
Authored by nu11secur1ty

Chat Bot version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 49ddf48680164af066978efabddac4f15a73ca97d2e553446260cc4ca68b75d9
CHAOS 5.0.8 Cross Site Scripting / Remote Command Execution
Posted May 21, 2024
Authored by h00die, chebuya | Site metasploit.com

CHAOS version 5.0.8 is a free and open-source Remote Administration Tool that allows generated binaries to control remote operating systems. The web application contains a remote command execution vulnerability which can be triggered by an authenticated user when generating a new executable. The web application also contains a cross site scripting vulnerability within the view of a returned command being executed on an agent.

tags | exploit, remote, web, xss
advisories | CVE-2024-30850, CVE-2024-31839
SHA-256 | f57ebc1eae72783c36ac9e3df7805d9879e3d1ced0b8232ea872b32518252dce
Joomla 4.2.8 Information Disclosure
Posted May 21, 2024
Authored by d4t4s3c

Joomla versions 4.2.8 and below remote unauthenticated information disclosure exploit.

tags | exploit, remote, info disclosure
advisories | CVE-2023-23752
SHA-256 | 626134242ae4ae7b4c28853f3d05cf44659ed92ca2ceb96b914b80675d522cdc
Nethserver 7 / 8 Cross Site Scripting
Posted May 21, 2024
Authored by Andrea Intilangelo

The NethServer module installed as WebTop, produced by Sonicle, is affected by a stored cross site scripting vulnerability due to insufficient input sanitization and output escaping which allows an attacker to store a malicious payload as to execute arbitrary web scripts or HTML. Versions 7 and 8 are affected.

tags | exploit, web, arbitrary, xss
advisories | CVE-2024-34058
SHA-256 | 71dee722377e162d1e9feb9e21ad78ba3b875d892287e875ff81e8ff1b5fccf2
PowerVR DevmemIntChangeSparse2() Dangling Page Table Entry
Posted May 21, 2024
Authored by Jann Horn, Google Security Research

PowerVR suffers from a wrong order of operations in DevmemIntChangeSparse2() that leads to a temporarily dangling page table entry.

tags | exploit
advisories | CVE-2024-31335
SHA-256 | c60d53fd594988ae874f9172ca988e0a08a60b03ec48452203f70a979e6d922e
PowerVR _UnrefAndMaybeDestroy() Use-After-Free
Posted May 21, 2024
Authored by Jann Horn, Google Security Research

PowerVR suffers from a use-after-free vulnerability in _UnrefAndMaybeDestroy().

tags | exploit
advisories | CVE-2024-34724
SHA-256 | 62d48fec6da2920518cfbf331f251078d85c51ab0a1e30e21ab38e0edd6f3b51
Arm Mali r45p0 Broken State Use-After-Free
Posted May 21, 2024
Authored by Jann Horn, Google Security Research

Arm Mali versions since r45p0 suffer from a broken KBASE_USER_BUF_STATE_* state machine for userspace mappings that can lead to a use-after-free condition.

tags | exploit
advisories | CVE-2024-1065
SHA-256 | 6886ec45419b22efaa4183177ef852a685bb4e3e8f20fe513a25b84dccef3243
Tenant Limited 1.0 SQL Injection
Posted May 20, 2024
Authored by nu11secur1ty

Tenant Limited version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 13e600b96629ae331bea16a5e73e10163b6351de44d850fb788d57cb33492417
WordPress XStore Theme 9.3.8 SQL Injection
Posted May 20, 2024
Authored by Abdualhadi Khalifa

WordPress XStore theme version 9.3.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2024-33559
SHA-256 | 477997916de186d3ba832ceed8e646fa8511ebfa7176c3c099d15df6b80d4ea2
Apache OFBiz 18.12.12 Directory Traversal
Posted May 20, 2024
Authored by Abdualhadi Khalifa

Apache OFBiz versions 18.12.12 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | bbe9f4e67d6b0040e47db9f61ccb61a6f0acf6e3a56d3be47bd40696ca022cef
Backdrop CMS 1.27.1 Remote Command Execution
Posted May 20, 2024
Authored by Ahmet Umit Bayram

Backdrop CMS version 1.27.1 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 707db64b489094cceb71c8280d7c7e3cdd4d55c06c3fc171b402d3dbf8f0c251
PopojiCMS 2.0.1 Remote Command Execution
Posted May 20, 2024
Authored by Ahmet Umit Bayram

PopojiCMS version 2.0.1 remote command execution exploit that requires an administrative login. This vulnerability was originally reported by tmrswrr in November of 2023.

tags | exploit, remote
SHA-256 | 0793753c218491dd6a931313f9bc9e153220431ab9d36e397a9a5a8f56951454
Rocket LMS 1.9 Cross Site Scripting
Posted May 20, 2024
Authored by Sergio Medeiros

Rocket LMS version 1.9 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-34241
SHA-256 | 0b7e90fca7d99f0c9238afaea97729e08614b1367dce8730e0cf753d7c7e4e9d
GhostRace: Exploiting And Mitigating Speculative Race Conditions
Posted May 16, 2024
Site github.com

This archive is a GhostRace proof of concept exploit exemplifying the concept of a speculative race condition in a step-by-step single-threaded fashion. Coccinelle scripts are used to scan the Linux kernel version 5.15.83 for Speculative Concurrent Use-After-Free (SCUAF) gadgets.

tags | exploit, kernel, proof of concept
systems | linux
advisories | CVE-2024-2193
SHA-256 | 37e02a934f238521d1f775356b1e8c43d4c6a81948b9dad1162cc1387ca9c199
Cacti 1.2.26 Remote Code Execution
Posted May 15, 2024
Authored by EgiX | Site karmainsecurity.com

Cacti versions 1.2.26 and below suffer from a remote code execution execution vulnerability in import.php.

tags | exploit, remote, php, code execution
advisories | CVE-2024-25641
SHA-256 | 86b50d4574919755d30f44ebc0972085ad39e9820171813614fe42cf0df9f937
SAP Cloud Connector 2.16.1 Missing Validation
Posted May 15, 2024
Authored by Mingshuo Li, Fabian Hagg | Site sec-consult.com

SAP Cloud Connector versions 2.15.0 through 2.16.1 were found to happily accept self-signed TLS certificates between SCC and SAP BTP.

tags | exploit
advisories | CVE-2024-25642
SHA-256 | bfc27f59ffa7a1d020eb1883e06f1b2a7891a0fff09f6afb7a4aef11cea69616
Zope 5.9 Command Injection
Posted May 15, 2024
Authored by Ilyase Dehy, Aymane MAZGUITI

Zope version 5.9 suffers from a command injection vulnerability in /utilities/mkwsgiinstance.py.

tags | exploit
advisories | CVE-2024-33828
SHA-256 | 1849107b888555128ddb84f1932e592e1a6cec7bad8f090a967908069ab52d02
CrushFTP Directory Traversal
Posted May 14, 2024
Authored by Abdualhadi Khalifa

CrushFTP versions prior to 11.1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f6f0dfaaef61e480d92184b9e2c78f7ab875206b68a377d6f7d4d096b36e0e6b
Page 1 of 2,117
Back12345Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close