exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files from Photubias

Email addresstijl.deneut at howest.be
First Active2015-05-19
Last Active2021-07-16
ForgeRock Access Manager/OpenAM 14.6.3 Remote Code Execution
Posted Jul 16, 2021
Authored by Photubias

ForgeRock Access Manager/OpenAM version 14.6.3 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-35464
SHA-256 | 7ded60e2fee61f85ac83d872fdce902efaac80f0e0a44bbbf62f99b5b122d9e6
VMware vCenter Server 7.0 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Photubias

VMware vCenter Server version 7.0 unauthenticated arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
advisories | CVE-2021-21972
SHA-256 | 799c1c46954c9683e557c8e1a417d133206fb6622b8109abd3fd919820dc39a2
Oracle WebLogic Server 14.1.1.0 Remote Code Execution
Posted Jan 22, 2021
Authored by Photubias

Oracle WebLogic Server version 14.1.1.0 authenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-2109
SHA-256 | 5de2e01ef80f612e9e69dbbead3b803428556dfb968be312ac48a6f5baf5b1e3
VMware vCenter Server 6.7 Authentication Bypass
Posted Jun 2, 2020
Authored by Photubias

VMware vCenter Server version 6.7 authentication bypass exploit.

tags | exploit, bypass
advisories | CVE-2020-3952
SHA-256 | 61416120dc1c2ebd56567136a1cab0725f5a29c9d0e7f8c6365f8c2fda18ab2d
Pi-hole 4.4.0 Remote Code Execution
Posted May 27, 2020
Authored by Photubias

Pi-hole version 4.4.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-11108
SHA-256 | c7a92f42c54992e326709bf0e3e1ed94ba5f65503d1d8babc2253d1fecbc3a84
vBulletin 5.6.1 SQL Injection
Posted May 15, 2020
Authored by Photubias

vBulletin version 5.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-12720
SHA-256 | e9bdd1a9c7ac4c698df1254cb099a495abfb2879f7affcf386aead86ed8ab655
Microsoft Exchange 2019 15.2.221.12 Remote Code Execution
Posted Mar 2, 2020
Authored by Photubias

Microsoft Exchange 2019 version 15.2.221.12 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-0688
SHA-256 | 2209d610405eecbd97899d9712efd45c455cffc7e713903504d884634ddf470f
eWON Flexy 13.0 Authentication Bypass
Posted Sep 11, 2019
Authored by Photubias

eWON Flexy with firmware version 13.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 76bf027bea193d108094970bd462dd2ebb200858467fc02d58f0a91a682501e5
Beckoff CX9020 CPU Model Remote Code Execution
Posted Oct 23, 2015
Authored by Photubias

This proof of concept exploit allows any attack to reboot any CX9020 PLC and add random (Web) users to be configured.

tags | exploit, web, proof of concept
advisories | CVE-2015-4051
SHA-256 | e9c12da930af4ff1905dfad1e33339cdaf3ba7a5fbb4f3b0eb58ec445d1ad02b
Phoenix Contact ILC 150 ETH PLC Remote Control
Posted May 19, 2015
Authored by Photubias

This proof of concept exploit will print out the current status of the PLC, continuously every 0.1 second, after 3 seconds it reverts (start becomes stop, stop becomes cold start), and stops after 5 seconds.

tags | exploit, proof of concept
advisories | CVE-2014-9195
SHA-256 | d7a36880de68cd531f525c06ef1c9527b8f6b3bd56c288af391f675d397be3aa
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close