what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files from Valentin Lobstein

First Active2021-11-11
Last Active2024-04-05
DerbyNet 9.0 print/render/racer.inc SQL Injection
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet 9.0 suffers from a remote SQL injection vulnerability in print/render/racer.inc.

tags | exploit, remote, sql injection
advisories | CVE-2024-30923
SHA-256 | c59f5b4f5d044eb7838a408a25e1ddb8966666ed55c708660903f015ccf7e1b5
DerbyNet 9.0 print/render/award.inc SQL Injection
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet 9.0 suffers from a remote SQL injection vulnerability in print/render/award.inc.

tags | exploit, remote, sql injection
advisories | CVE-2024-30922
SHA-256 | 635f60dcea426f833c149bf378a0e8ce1585c3548641f81eb1702cf39c8c50de
DerbyNet 9.0 ajax/query.slide.next.inc SQL Injection
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet 9.0 suffers from a remote SQL injection vulnerability in ajax/query.slide.next.inc.

tags | exploit, remote, sql injection
advisories | CVE-2024-30928
SHA-256 | 4d58e0287f76d2e5689e86c7f6907829d0e768e9a60e0f2ac317c9153ee4e3b6
DerbyNet 9.0 playlist.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in playlist.php.

tags | exploit, php, xss
advisories | CVE-2024-30929
SHA-256 | 33a3298bf5768c9f7a9fcd2deaa459729d65f2eb60c8601a0d2dd30561151395
DerbyNet 9.0 racer-results.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in racer-results.php.

tags | exploit, php, xss
advisories | CVE-2024-30927
SHA-256 | e1f0ec83ec56b1d3ebff89be4223a47e4c6caea8be38185b375b827447078473
DerbyNet 9.0 inc/kisosks.inc Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in inc/kiosks.inc.

tags | exploit, xss
advisories | CVE-2024-30926
SHA-256 | 74c4544a3c0353807fe286b034266f311ce4af6f554209e73f1d797e5fbff5cc
DerbyNet 9.0 photo-thumbs.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in photo-thumbs.php.

tags | exploit, php, xss
advisories | CVE-2024-30925
SHA-256 | e33a05805911bcd786fdff15a7d4ac31f136e43e12a0f9ec5b25c0db38d7fe3e
DerbyNet 9.0 checkin.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in checkin.php.

tags | exploit, php, xss
advisories | CVE-2024-30924
SHA-256 | 8f9e6fd28f6cfe91749cb218425046ee910787a3a9fd05dafed94fca09da5a72
DerbyNet 9.0 photo.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in photo.php.

tags | exploit, php, xss
advisories | CVE-2024-30921
SHA-256 | d7ac5458d2d0756d2d607450406a0027661faffb3740c59db51f83e2e7620fe8
DerbyNet 9.0 render-document.php Cross Site Scripting
Posted Apr 5, 2024
Authored by Valentin Lobstein

DerbyNet version 9.0 suffers from a cross site scripting vulnerability in render-document.php.

tags | exploit, php, xss
advisories | CVE-2024-30920
SHA-256 | 6ac6f7dc08e5aa36734a4a3929671a6b16c39f23cfa800f533b74b3aa6969051
WordPress Bricks Builder Theme 1.9.6 Remote Code Execution
Posted Mar 27, 2024
Authored by Valentin Lobstein, Calvin Alkan | Site metasploit.com

This Metasploit module exploits an unauthenticated remote code execution vulnerability in the Bricks Builder Theme versions 1.9.6 and below for WordPress. The vulnerability allows attackers to execute arbitrary PHP code by leveraging a nonce leakage to bypass authentication and exploit the eval() function usage within the theme. Successful exploitation allows for full control of the affected WordPress site. It is recommended to upgrade to version 1.9.6.1 or higher.

tags | exploit, remote, arbitrary, php, code execution
advisories | CVE-2024-25600
SHA-256 | 5a32fb78bdb52593a7f339d7321ec50570d8dc8998da3f4da0c0eaf663f73ac5
Vinchin Backup And Recovery 7.2 Command Injection
Posted Mar 14, 2024
Authored by Valentin Lobstein

Vinchin Backup and Recovery versions 7.2 and below suffer from an authentication command injection vulnerability.

tags | exploit
advisories | CVE-2024-25228
SHA-256 | dd0fc3f58917682d94f66913e102128d1a5e1eb10e34fa851b9f47a77fc06b74
Vinchin Backup And Recovery 7.2 SystemHandler.class.php Command Injection
Posted Jan 26, 2024
Authored by Valentin Lobstein

Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in SystemHandler.class.php.

tags | exploit, php
advisories | CVE-2024-22903
SHA-256 | dc8db7a93b49f089a2c51bccac868cf579a7563c72b570b389665c44bbc72c33
Vinchin Backup And Recovery 7.2 Default Root Credentials
Posted Jan 26, 2024
Authored by Valentin Lobstein

Vinchin Backup and Recovery version 7.2 has been identified as being configured with default root credentials, posing a significant security vulnerability.

tags | exploit, root
advisories | CVE-2024-22902
SHA-256 | 143e6238373ef81a5ff8ac20adcd938850570b964ce2524cbda8409d063c34f6
Vinchin Backup And Recovery 7.2 Default MySQL Credentials
Posted Jan 26, 2024
Authored by Valentin Lobstein

A critical security issue has been discovered in Vinchin Backup and Recovery version 7.2. The software has been found to use default MYSQL credentials, which could lead to significant security risks.

tags | exploit
advisories | CVE-2024-22901
SHA-256 | 5cbb4901365c8c32a2383f8e2b3f381029f1d5fc24795a4103af00a458e5220b
Vinchin Backup And Recovery 7.2 syncNtpTime Command Injection
Posted Jan 26, 2024
Authored by Valentin Lobstein

Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the syncNtpTime function.

tags | exploit
advisories | CVE-2024-22899
SHA-256 | 0242c4e4a374f9777179ac019e4dd5586b14c724b7f3ef5b41b8ad3c320ff6b3
Vinchin Backup And Recovery 7.2 setNetworkCardInfo Command Injection
Posted Jan 26, 2024
Authored by Valentin Lobstein

Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the setNetworkCardInfo function.

tags | exploit
advisories | CVE-2024-22900
SHA-256 | 2407896a2dd181668f83b4a0636bae9fcbdf6fe55fccd57e7c2642e04f270ff5
MajorDoMo Command Injection
Posted Jan 22, 2024
Authored by Valentin Lobstein, smcintyre-r7 | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in MajorDoMo versions before 0662e5e.

tags | exploit
advisories | CVE-2023-50917
SHA-256 | a64c3d5f624bfad203f1e2566417514a7d618f792becc950fdc3d537aaa74a64
WordPress Backup Migration 1.3.7 Remote Command Execution
Posted Jan 18, 2024
Authored by jheysel-r7, Valentin Lobstein, Nex Team | Site metasploit.com

This Metasploit module exploits an unauthenticated remote command execution vulnerability in WordPress Backup Migration plugin versions 1.3.7 and below. The vulnerability is exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint. The exploit makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend a PHP payload to a string which gets evaluated by a require statement, which results in command execution.

tags | exploit, remote, php
advisories | CVE-2023-6553
SHA-256 | 1feecca12306422ebe993c3821d87be77ad3056e719f9dcbae7c033f156e447f
Vinchin Backup And Recovery Command Injection
Posted Dec 21, 2023
Authored by Valentin Lobstein, Gregory Boddin | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in Vinchin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.*. Due to insufficient input validation in the checkIpExists API endpoint, an attacker can execute arbitrary commands as the web server user.

tags | exploit, web, arbitrary
advisories | CVE-2023-45498, CVE-2023-45499
SHA-256 | 3d8e50d9f7626533b7df0f51d965d0f800628210479cd9fb5dd93a7e5ade89f2
MajorDoMo Remote Code Execution
Posted Dec 20, 2023
Authored by Valentin Lobstein

MajorDoMo versions prior to 0662e5e suffer from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2023-50917
SHA-256 | 230b495a6b7565bbb5d5945866c2290e007fca5c2b4cb6c9a1eee7926b83eddc
Splunk XSLT Upload Remote Code Execution
Posted Dec 12, 2023
Authored by h00die, Valentin Lobstein, nathan | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Splunk Enterprise. The affected versions include 9.0.x before 9.0.7 and 9.1.x before 9.1.2. The exploitation process leverages a weakness in the XSLT transformation functionality of Splunk. Successful exploitation requires valid credentials, typically admin:changeme by default. The exploit involves uploading a malicious XSLT file to the target system. This file, when processed by the vulnerable Splunk server, leads to the execution of arbitrary code. The module then utilizes the runshellscript capability in Splunk to execute the payload, which can be tailored to establish a reverse shell. This provides the attacker with remote control over the compromised Splunk instance. The module is designed to work seamlessly, ensuring successful exploitation under the right conditions.

tags | exploit, remote, arbitrary, shell, code execution
advisories | CVE-2023-46214
SHA-256 | ea31fbcf387f710ebb5a4b9243ec8009edb093af5bce5d17f8b759e679c83bdf
WordPress Royal Elementor Addons And Templates Remote Shell Upload
Posted Nov 29, 2023
Authored by Valentin Lobstein, Fioravante Souza | Site metasploit.com

WordPress Royal Elementor Addons and Templates plugin versions prior to 1.3.79 suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2023-5360
SHA-256 | 514871b05ceb1ed65e97c420f4e9a96957ce2443102fd59ba2de86664048ea50
Zyxel USG FLEX 5.21 Command Injection
Posted Jun 3, 2022
Authored by Valentin Lobstein

Zyxel USG FLEX version 5.21 suffers from a command injection vulnerability.

tags | exploit
advisories | CVE-2022-30525
SHA-256 | d241a3c90061a120559caf280f0fe2fd049d9b836481bf51a1841e3861dfdf0a
Apache HTTP Server 2.4.50 Remote Code Execution
Posted Nov 11, 2021
Authored by Valentin Lobstein, Lucas Schnell

This is another variant of the Apache HTTP server version 2.4.50 remote code execution exploit.

tags | exploit, remote, web, code execution
advisories | CVE-2021-41773, CVE-2021-42013
SHA-256 | 1aab010960ead5e3662859fd06680b20932ece6ecf7a7c80a05437497896bb8f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close