what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Samy Younsi

First Active2022-06-07
Last Active2024-03-11
DataCube3 1.0 Shell Upload
Posted Mar 11, 2024
Authored by Samy Younsi

DataCube3 version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2024-25830, CVE-2024-25832
SHA-256 | a5ca9dcfc24b6607634b3ccc91b9b2cf12ca8ba0a229101f9e74e14975448d9a
FLIR AX8 1.46.16 Remote Command Injection
Posted Nov 2, 2022
Authored by Samy Younsi, Thomas Knudsen, h00die-gr3y | Site metasploit.com

All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to remote command injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. This module uses the vulnerability to upload and execute payloads gaining root privileges.

tags | exploit, remote, web, arbitrary, shell, root, php
advisories | CVE-2022-37061
SHA-256 | a321cd3e8960e684cbab1cd82bb0f9be0cda474af87c57e7f89fa9aaa83b6bca
FLIR AX8 1.46.16 Traversal / Access Control / Command Injection / XSS
Posted Aug 19, 2022
Authored by Samy Younsi, Thomas Knudsen

FLIR AX8 versions 1.46.16 and below suffer from command injection, directory traversal, improper access control, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
advisories | CVE-2022-37060, CVE-2022-37061, CVE-2022-37062, CVE-2022-37063
SHA-256 | d4b0fa3d39bb7d9eb67520d399557821deb5682ab4e0f91e473b5af510fec4d7
FLIX AX8 1.46.16 Remote Command Execution
Posted Aug 19, 2022
Authored by Samy Younsi

FLIR AX8 versions 1.46.16 and below unauthenticated remote OS command injection exploit.

tags | exploit, remote
advisories | CVE-2022-36266
SHA-256 | d69929a972eb08cfeb279707887a6f7dd7e33ba6198b5c583c8af9bc510a1eb7
AirSpot 5410 0.3.4.1-4 Remote Command Injection
Posted Aug 10, 2022
Authored by Samy Younsi

AirSpot 5410 versions 0.3.4.1-4 and below suffer from an unauthenticated remote command injection vulnerability.

tags | exploit, remote
advisories | CVE-2022-36267
SHA-256 | 0453a46f41ec4c59c37a44bb644827c11fe0d7e8677419a16aefa00836c95383
Patlite 1.46 Buffer Overflow
Posted Jul 25, 2022
Authored by Samy Younsi

Patlite versions 1.45 and below suffer from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2022-35911
SHA-256 | 5c29e3afa128083754b4bac9a8b929fac03751344f5c65c15f43df42fefcb136
OctoBot WebInterface 0.4.3 Remote Code Execution
Posted Jul 21, 2022
Authored by Samy Younsi, Thomas Knudsen

OctoBot WebInterface version 0.4.3 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-36711
SHA-256 | e44b74ee9184e1f4fa497f4876744c69864ed4d789de8a18313422be9a4ad1c5
Sashimi Evil OctoBot Tentacle
Posted Jul 11, 2022
Authored by Samy Younsi, Thomas Knudsen | Site github.com

Sashimi Evil OctoBot Tentacle is a python script that exploits a vulnerability that lies in the Tentacles upload functionality of the cryptocurrency trading bot OctoBot which is designed to be easy to use and customizable. Versions 0.4.0beta3 through 0.4.3 are affected.

tags | exploit, python
advisories | CVE-2021-36711
SHA-256 | 67657fcc4e1e91fdf6687effb98e5e02419480dc043b1f499700a2140f08b47b
Confluence OGNL Injection Proof Of Concept
Posted Jun 7, 2022
Authored by Samy Younsi | Site github.com

Proof of concept script that exploits the remote code execution vulnerability affecting Atlassian Confluence versions 7.18 and below. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance. All supported versions of Confluence Server and Data Center are affected. Confluence Server and Data Center versions after 1.3.0 and below 7.18.1 are affected. The vulnerability has a CVSS score of 10 out of 10 for criticality.

tags | exploit, remote, arbitrary, code execution, proof of concept
advisories | CVE-2022-26134
SHA-256 | af35a5a0af240395f62e977601885f29387ee4fc958081d1910e6f6f0d3d428a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close