exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Antonio Cuomo

First Active2022-02-04
Last Active2023-06-26
Bludit Arbitrary File Download
Posted Jun 26, 2023
Authored by Antonio Cuomo

Bludit versions prior to 3.13.1 backup plugin arbitrary file download exploit.

tags | exploit, arbitrary
SHA-256 | fc25e3c67b748f5f8606de2659514e9af91d3c231227972f99669d984e02172e
Microsoft Exchange Active Directory Topology 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Active Directory Topology version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 2f407977c098abbdb0946a25c077ddadc45d9fc1ae9d33ebaf509cd00c834bcf
Microsoft Exchange Mailbox Assistants 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Mailbox Assistants version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 04b6aa4ca61d40818e86e87cea3f096b7a0df693e124440f7a45ee236a584cbd
WOW21 5.0.1.9 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

WOW21 version 5.0.1.9 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | dd3790169d6ed36986ad50b78130b908b3afd0bfc81309448db2fec5970807fd
Sandboxie-Plus 5.50.2 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

Sandboxie-Plus version 5.50.2 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | c11e7ad42d8bfa9e14b092d5fce628e76aa5c16a926d44c5e66ffe8de045f235
WebHMI 4.1.1 Remote Code Execution
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1.1 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 9ec2ea072428767210d471852bd4785bd1f9aab93fa6e35bbeb57de5af3141b1
WebHMI 4.1 Cross Site Scripting
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9a79ffd78086ac8526640817df8e0ee76209ca17e8ee700783f07c504cba1374
WBCE CMS 1.5.2 Remote Code Execution
Posted Feb 4, 2022
Authored by Antonio Cuomo

WBCE CMS version 1.5.2 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | ac470b209db9aac30a9ffc3a993d8a7bcead871e9c7d6ee1b377790410f82faf
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close