exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Sina Kheirkhah

Email addressSina.For.Sec at gmail.com
First Active2018-05-20
Last Active2024-07-08
VMWare Aria Operations For Networks Command Injection
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection when accepting user input through the Apache Thrift RPC interface. This is a proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2023-20887
SHA-256 | c714227bbfea1d4fec4126f79c54dfdd4ec91c95a6e8c0ffc7b795b17b7901ee
Veeam Backup Enterprise Manager Authentication Bypass
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Veeam Backup Enterprise Manager authentication bypass proof of concept exploit. Versions prior to 12.1.2.172 are vulnerable.

tags | exploit, proof of concept
advisories | CVE-2024-29849
SHA-256 | 31fb3b66c17ab7cbfde346b10334c22f95eded003360d0eab92157d99cefd29c
Veeam Recovery Orchestrator Authentication Bypass
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Veeam Recovery Orchestrator authentication bypass proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2024-29855
SHA-256 | c7b976542137634b6839638c2c6a072b32e8cf78c61435488fcde8c526101303
Telerik Report Server Deserialization / Authentication Bypass
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Telerik Report Server deserialization and authentication bypass exploit chain that makes use of the vulnerabilities noted in CVE-2024-4358 and CVE-2024-1800.

tags | exploit, vulnerability
advisories | CVE-2024-1800, CVE-2024-4358
SHA-256 | 973c92a0a0da78a80793a389527088eee6855414a151fa24deb8c5bd767aaa68
Progress WhatsUp Gold WriteDatafile Unauthenticated Remote Code Execution
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Progress WhatsUp Gold WriteDatafile unauthenticated remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2024-4883
SHA-256 | 8555b3fc19ed4287c691eed2de41c35a867aa34e1477c6e4b70035490dca6662
Progress WhatsUp Gold GetFileWithoutZip Unauthenticated Remote Code Execution
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Progress WhatsUp Gold GetFileWithoutZip unauthenticated remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2024-4885
SHA-256 | 645be8b10a258029fe6ad8527b1a56a51a5c0b7d9500967dd05deb6a107887f2
Progress WhatsUp Gold SetAdminPassword Privilege Escalation
Posted Jul 8, 2024
Authored by Sina Kheirkhah | Site summoning.team

Progress WhatsUp Gold SetAdminPassword local privilege escalation proof of concept exploit.

tags | exploit, local
advisories | CVE-2024-5009
SHA-256 | 4fdd4c3d26080412d3e0343ba88ccb320022c89ddf9ee90fd9e8f72c6264afde
VMWare Aria Operations For Networks Remote Code Execution
Posted Sep 2, 2023
Authored by Harsh Jaiswal, Sina Kheirkhah, Rahul Maini | Site summoning.team

VMWare Aria Operations for Networks (vRealize Network Insight) static SSH key remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2023-34039
SHA-256 | ae67475970c05c39bc93428dddf3a98ddfed987c1bd13fb23f729e242a686959
VMWare Aria Operations For Networks Remote Command Execution
Posted Jul 26, 2023
Authored by h00die, Sina Kheirkhah | Site metasploit.com

VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection when accepting user input through the Apache Thrift RPC interface. This vulnerability allows a remote unauthenticated attacker to execute arbitrary commands on the underlying operating system as the root user. The RPC interface is protected by a reverse proxy which can be bypassed. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. A malicious actor can get remote code execution in the context of root on the appliance. VMWare 6.x version are vulnerable. This Metasploit module exploits the vulnerability to upload and execute payloads gaining root privileges. Successfully tested against version 6.8.0.

tags | exploit, remote, arbitrary, root, code execution
advisories | CVE-2023-20887
SHA-256 | 9a55a0c02bec8e756eeac40f3ab58ccc0499c9bbbde741db5c148ebfa61b29ee
VMware NSX Manager XStream Unauthenticated Remote Code Execution
Posted Nov 15, 2022
Authored by mr_me, Sina Kheirkhah, h00die-gr3y | Site metasploit.com

VMware Cloud Foundation (NSX-V) contains a remote code execution vulnerability via XStream open source library. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of root on the appliance. VMware Cloud Foundation 3.x and more specific NSX Manager Data Center for vSphere up to and including version 6.4.13 are vulnerable to remote command injection. This Metasploit module exploits the vulnerability to upload and execute payloads gaining root privileges.

tags | exploit, remote, root, code execution
advisories | CVE-2021-39144
SHA-256 | e1f5fa59aee9a79145c46b8829a1543dbca23d36d00d330dacc1326a5f871b45
Joomla EkRishta 2.10 Cross Site Scripting / SQL Injection
Posted May 20, 2018
Authored by Sina Kheirkhah

Joomla EkRishta component version 2.10 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 462bfa4a5d18598f2ed6f9a42ef2ff4e97661f647a5e65c738c5c5e3f8b3fbd2
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close