exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Antonio Cuomo

First Active2022-02-04
Last Active2023-06-26
Bludit Arbitrary File Download
Posted Jun 26, 2023
Authored by Antonio Cuomo

Bludit versions prior to 3.13.1 backup plugin arbitrary file download exploit.

tags | exploit, arbitrary
SHA-256 | fc25e3c67b748f5f8606de2659514e9af91d3c231227972f99669d984e02172e
Microsoft Exchange Active Directory Topology 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Active Directory Topology version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 2f407977c098abbdb0946a25c077ddadc45d9fc1ae9d33ebaf509cd00c834bcf
Microsoft Exchange Mailbox Assistants 15.0.847.40 Unquoted Service Path
Posted Apr 18, 2022
Authored by Antonio Cuomo

Microsoft Exchange Mailbox Assistants version 15.0.847.40 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 04b6aa4ca61d40818e86e87cea3f096b7a0df693e124440f7a45ee236a584cbd
WOW21 5.0.1.9 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

WOW21 version 5.0.1.9 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | dd3790169d6ed36986ad50b78130b908b3afd0bfc81309448db2fec5970807fd
Sandboxie-Plus 5.50.2 Unquoted Service Path
Posted Mar 10, 2022
Authored by Antonio Cuomo

Sandboxie-Plus version 5.50.2 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | c11e7ad42d8bfa9e14b092d5fce628e76aa5c16a926d44c5e66ffe8de045f235
WebHMI 4.1.1 Remote Code Execution
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1.1 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 9ec2ea072428767210d471852bd4785bd1f9aab93fa6e35bbeb57de5af3141b1
WebHMI 4.1 Cross Site Scripting
Posted Feb 23, 2022
Authored by Antonio Cuomo

WebHMI version 4.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9a79ffd78086ac8526640817df8e0ee76209ca17e8ee700783f07c504cba1374
WBCE CMS 1.5.2 Remote Code Execution
Posted Feb 4, 2022
Authored by Antonio Cuomo

WBCE CMS version 1.5.2 authenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | ac470b209db9aac30a9ffc3a993d8a7bcead871e9c7d6ee1b377790410f82faf
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close