what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Antonio Cuomo

First Active2022-02-04
Last Active2023-06-26
Bludit Arbitrary File Download
Posted Jun 26, 2023
Authored by Antonio Cuomo

Bludit versions prior to 3.13.1 backup plugin arbitrary file download exploit.

tags | exploit, arbitrary
SHA-256 | fc25e3c67b748f5f8606de2659514e9af91d3c231227972f99669d984e02172e
Microsoft Exchange Active Directory Topology 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Active Directory Topology version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 2f407977c098abbdb0946a25c077ddadc45d9fc1ae9d33ebaf509cd00c834bcf
Microsoft Exchange Mailbox Assistants 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Mailbox Assistants version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 04b6aa4ca61d40818e86e87cea3f096b7a0df693e124440f7a45ee236a584cbd
WOW21 5.0.1.9 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

WOW21 version 5.0.1.9 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | dd3790169d6ed36986ad50b78130b908b3afd0bfc81309448db2fec5970807fd
Sandboxie-Plus 5.50.2 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

Sandboxie-Plus version 5.50.2 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | c11e7ad42d8bfa9e14b092d5fce628e76aa5c16a926d44c5e66ffe8de045f235
WebHMI 4.1.1 Remote Code Execution
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1.1 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 9ec2ea072428767210d471852bd4785bd1f9aab93fa6e35bbeb57de5af3141b1
WebHMI 4.1 Cross Site Scripting
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9a79ffd78086ac8526640817df8e0ee76209ca17e8ee700783f07c504cba1374
WBCE CMS 1.5.2 Remote Code Execution
Posted Feb 4, 2022
Authored by Antonio Cuomo

WBCE CMS version 1.5.2 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | ac470b209db9aac30a9ffc3a993d8a7bcead871e9c7d6ee1b377790410f82faf
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close