exploit the possibilities
Showing 1 - 12 of 12 RSS Feed

Files from Alexandre Zanni

Real NameAlexandre ZANNI
Email addressprivate
First Active2019-07-19
Last Active2021-07-13
View User Profile
OpenEMR 5.0.1.3 Shell Upload
Posted Jul 13, 2021
Authored by Alexandre Zanni

OpenEMR version 5.0.1.3 authenticated remote shell upload exploit that leverages a vulnerability discovered in 2018.

tags | exploit, remote, shell
advisories | CVE-2018-15139
MD5 | 42dde552844a71d54aa98a08c105ae9f
OpenEMR 5.0.1.7 Path Traversal
Posted Jul 5, 2021
Authored by Alexandre Zanni

OpenEMR version 5.0.17 path traversal exploit.

tags | exploit, file inclusion
advisories | CVE-2019-14530
MD5 | a7622ae19ddf3cafa635248b9528fd2c
Monitorr 1.7.6m Bypass / Information Disclosure / Shell Upload
Posted Jun 23, 2021
Authored by Alexandre Zanni

This ruby script is a 4-in-1 exploit that leverages shell upload, bypass, and information disclosure vulnerabilities in Monitorr version 1.7.6m.

tags | exploit, shell, vulnerability, bypass, info disclosure, ruby
advisories | CVE-2020-28871, CVE-2020-28872
MD5 | 5113f4119e78d0b0c1dcb46bad362104
OpenNetAdmin 18.1.1 Remote Command Execution
Posted May 10, 2021
Authored by Alexandre Zanni

OpenNetAdmin versions 8.5.14 through 18.1.1 remote command execution exploit written in Ruby. This exploit was based on the original discovery of the issue by mattpascoe.

tags | exploit, remote, ruby
MD5 | b2ea2bd02abebc013ca6ae8665950e12
CMSUno 1.6.2 Remote Code Execution
Posted Jan 28, 2021
Authored by Alexandre Zanni

CMSUno version 1.6.2 authenticated remote code execution exploit. The original discovery for the vulnerability leveraged is attributed to Fatih Celik in November of 2020.

tags | exploit, remote, code execution
advisories | CVE-2020-25538, CVE-2020-25557
MD5 | c9bd2539c27d5fd817353fb1531448fc
Fuel CMS 1.4 Remote Code Execution
Posted Nov 16, 2020
Authored by Alexandre Zanni

Fuel CMS version 1.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2018-16763
MD5 | f88a78cccfead351aa11b3cbeccf039c
Bludit 3.9.2 Authentication Bruteforce Mitigation Bypass
Posted Aug 17, 2020
Authored by Alexandre Zanni

Bludit version 3.9.2 suffer from an authentication bruteforce mitigation bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2019-17240
MD5 | c6dff6690c6c86eb156fab0297f9c1c1
Umbraco CMS 7.12.4 Remote Code Execution
Posted Aug 3, 2020
Authored by Alexandre Zanni | Site github.com

Umbraco CMS version 7.12.4 authenticated remote code execution exploit.

tags | exploit, remote, code execution
MD5 | c6a4a934c6775c455e5e4f225dec66c0
OpenEMR 5.0.1 Remote Code Execution
Posted Aug 3, 2020
Authored by Alexandre Zanni | Site github.com

OpenEMR versions 5.0.1 and below authenticated remote code execution exploit written in ruby.

tags | exploit, remote, code execution, ruby
MD5 | 0c4b5a66f0b188dd68ac3a5de13961d4
AtMail Email Server Appliance 6.4 XSS / CSRF / Code Execution
Posted Aug 3, 2020
Authored by Alexandre Zanni | Site github.com

Atmail Email Server Appliance version 6.4 exploit toolchain that leverages cross site scripting and cross site request forgery to achieve code execution.

tags | exploit, code execution, xss, csrf
MD5 | 5e8eedf4d9e738503fa65cc3f2f4de89
Alfresco 5.2.4 Cross Site Scripting
Posted Mar 3, 2020
Authored by Alexandre Zanni, Romain Loisel

Alfresco version 5.2.4 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2020-8776, CVE-2020-8777, CVE-2020-8778
MD5 | 9a68ded6b119a4f8aa4a356c744ceadb
REDCap Cross Site Scripting
Posted Jul 19, 2019
Authored by Dylan Garnaud, Alexandre Zanni

REDCap versions prior to 9.1.2 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-13029
MD5 | a514baa5eac983b54a70b38657784e03
Page 1 of 1
Back1Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close