exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from Photubias

Email addresstijl.deneut at howest.be
First Active2015-05-19
Last Active2024-08-31
PhoenixContact PLC Remote START/STOP Command
Posted Aug 31, 2024
Authored by Photubias | Site metasploit.com

PhoenixContact Programmable Logic Controllers are built upon a variant of ProConOS. Communicating using a proprietary protocol over ports TCP/1962 and TCP/41100 or TCP/20547. It allows a remote user to read out the PLC Type, Firmware and Build number on port TCP/1962. And also to read out the CPU State (Running or Stopped) AND start or stop the CPU on port TCP/41100 (confirmed ILC 15x and 17x series) or on port TCP/20547 (confirmed ILC 39x series).

tags | exploit, remote, tcp, protocol
advisories | CVE-2014-9195
SHA-256 | 121da6ea0c1ed5792460a8fc75979c956e19cb91d2f862453bd1833c0c4711f2
Microsoft Windows IPv6 CVE-2024-38063 Checker / Denial Of Service
Posted Aug 29, 2024
Authored by Photubias

Microsoft Windows IPv6 vulnerability checking proof of concept python script that causes a denial of service. Windows 10 and 11 versions under 10.0.26100.1457 and Server 2016-2019-2022 versions under 10.0.17763.6189 are affected.

tags | exploit, denial of service, proof of concept, python
systems | windows
advisories | CVE-2024-38063
SHA-256 | 04c38d06a082513de8abf2875e18f1ebec41c245eac05cf7f60cc0cff919185a
ForgeRock Access Manager/OpenAM 14.6.3 Remote Code Execution
Posted Jul 16, 2021
Authored by Photubias

ForgeRock Access Manager/OpenAM version 14.6.3 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-35464
SHA-256 | 7ded60e2fee61f85ac83d872fdce902efaac80f0e0a44bbbf62f99b5b122d9e6
VMware vCenter Server 7.0 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Photubias

VMware vCenter Server version 7.0 unauthenticated arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
advisories | CVE-2021-21972
SHA-256 | 799c1c46954c9683e557c8e1a417d133206fb6622b8109abd3fd919820dc39a2
Oracle WebLogic Server 14.1.1.0 Remote Code Execution
Posted Jan 22, 2021
Authored by Photubias

Oracle WebLogic Server version 14.1.1.0 authenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-2109
SHA-256 | 5de2e01ef80f612e9e69dbbead3b803428556dfb968be312ac48a6f5baf5b1e3
VMware vCenter Server 6.7 Authentication Bypass
Posted Jun 2, 2020
Authored by Photubias

VMware vCenter Server version 6.7 authentication bypass exploit.

tags | exploit, bypass
advisories | CVE-2020-3952
SHA-256 | 61416120dc1c2ebd56567136a1cab0725f5a29c9d0e7f8c6365f8c2fda18ab2d
Pi-hole 4.4.0 Remote Code Execution
Posted May 27, 2020
Authored by Photubias

Pi-hole version 4.4.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-11108
SHA-256 | c7a92f42c54992e326709bf0e3e1ed94ba5f65503d1d8babc2253d1fecbc3a84
vBulletin 5.6.1 SQL Injection
Posted May 15, 2020
Authored by Photubias

vBulletin version 5.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-12720
SHA-256 | e9bdd1a9c7ac4c698df1254cb099a495abfb2879f7affcf386aead86ed8ab655
Microsoft Exchange 2019 15.2.221.12 Remote Code Execution
Posted Mar 2, 2020
Authored by Photubias

Microsoft Exchange 2019 version 15.2.221.12 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-0688
SHA-256 | 2209d610405eecbd97899d9712efd45c455cffc7e713903504d884634ddf470f
eWON Flexy 13.0 Authentication Bypass
Posted Sep 11, 2019
Authored by Photubias

eWON Flexy with firmware version 13.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 76bf027bea193d108094970bd462dd2ebb200858467fc02d58f0a91a682501e5
Beckoff CX9020 CPU Model Remote Code Execution
Posted Oct 23, 2015
Authored by Photubias

This proof of concept exploit allows any attack to reboot any CX9020 PLC and add random (Web) users to be configured.

tags | exploit, web, proof of concept
advisories | CVE-2015-4051
SHA-256 | e9c12da930af4ff1905dfad1e33339cdaf3ba7a5fbb4f3b0eb58ec445d1ad02b
Phoenix Contact ILC 150 ETH PLC Remote Control
Posted May 19, 2015
Authored by Photubias

This proof of concept exploit will print out the current status of the PLC, continuously every 0.1 second, after 3 seconds it reverts (start becomes stop, stop becomes cold start), and stops after 5 seconds.

tags | exploit, proof of concept
advisories | CVE-2014-9195
SHA-256 | d7a36880de68cd531f525c06ef1c9527b8f6b3bd56c288af391f675d397be3aa
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close