what you don't know can hurt you
Showing 51 - 75 of 6,373 RSS Feed

Code Execution Files

Apache HTTP Server 2.4.50 Remote Code Execution
Posted Oct 24, 2021
Authored by thelastvvv

Apache HTTP Server version 2.4.50 remote code execution exploit.

tags | exploit, remote, web, code execution
advisories | CVE-2021-42013
MD5 | 00e3007a5d132ef7e927cc763523a813
Apple Security Advisory 2021-10-11-1
Posted Oct 20, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-10-11-1 - iOS 15.0.2 and iPadOS 15.0.2 address a code execution vulnerability.

tags | advisory, code execution
systems | apple, ios
advisories | CVE-2021-30883
MD5 | 9e6f048f643366aae176a51313727967
Backdoor.Win32.LanFiltrator.11.b Code Execution
Posted Oct 18, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.LanFiltrator.11.b malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
MD5 | c299aaca4f851fae1930c8e5f36d3dbd
Apache HTTP Server 2.4.50 Path Traversal / Code Execution
Posted Oct 13, 2021
Authored by Lucas Souza

Apache HTTP Server version 2.4.50 suffers from path traversal and code execution vulnerabilities.

tags | exploit, web, vulnerability, code execution, file inclusion
advisories | CVE-2021-42013
MD5 | 83e881b06b8c45b03c0e1280bba0e9df
Moodle Teacher Enrollment Privilege Escalation / Remote Code Execution
Posted Oct 12, 2021
Authored by h00die, lanz, HoangKien1020 | Site metasploit.com

Moodle versions 3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12, and earlier unsupported versions allow for a teacher to exploit chain to remote code execution. A bug in the privileges system allows a teacher to add themselves as a manager to their own class. They can then add any other users, and thus look to add someone with manager privileges on the system (not just the class). After adding a system manager, a loginas feature is used to access their account. Next the system is reconfigured to allow for all users to install an addon/plugin. Then a malicious theme is uploaded and creates an RCE. If all of that is a success, we revert permissions for managers to system default and remove our malicious theme. Manual cleanup to remove students from the class is required. This Metasploit module was tested against Moodle version 3.9.

tags | exploit, remote, code execution
advisories | CVE-2020-14321
MD5 | ebc3a909ac2dea6048c783034195cd70
Maian-Cart 3.8 Remote Code Execution
Posted Oct 8, 2021
Authored by DreyAnd, purpl3

Maian-Cart version 3.8 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2021-32172
MD5 | 8d98805ee6c43d397382d4e44c8b3d0c
Google SLO-Generator 2.0.0 Code Execution
Posted Oct 7, 2021
Authored by Kiran Ghimire

Google SLO-Generator versions 2.0.0 and below suffer from a code execution vulnerability.

tags | exploit, code execution
advisories | CVE-2021-22557
MD5 | 7501ed60c77636b8e341c9d98a19821f
Microsoft Office OneNote 2007 Remote Code Execution
Posted Oct 6, 2021
Authored by Eduardo Braun Prado

Microsoft Office OneNote 2007 proof of concept exploit for a OnePKG file parsing remote code execution vulnerability. Upon decompressing files from .ONEPKG archives (using MS CAB format), a failure to sanitize file paths and file contents allows for arbitrary file planting in arbitrary locations on the OS, including the startup folder.

tags | exploit, remote, arbitrary, code execution, proof of concept
advisories | CVE-2014-2815
MD5 | 66b82cd487db6f570ee8d45f756cf2ca
Open Game Panel Remote Code Execution
Posted Oct 4, 2021
Authored by prey

Open Game Panel suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 4a44064f3593b04c3c02e8b2d071ef52
Cmsimple 5.4 Remote Code Execution
Posted Sep 30, 2021
Authored by pussycat0x

Cmsimple version 5.4 authenticated remote code execution exploit.

tags | exploit, remote, code execution
MD5 | 46792c26a9315734cd7d64fb53dadde5
CMS Made Simple 2.1.3 Remote Code Execution
Posted Sep 27, 2021
Authored by Raed Ahsan

CMS Made Simple version 2.1.3 details on how to achieve remote code execution.

tags | exploit, remote, code execution
MD5 | 1d05bbd0a0739e3bf334b6bce440369c
Backdoor.Win32.Hupigon.afjk Authentication Bypass / Code Execution
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.afjk malware suffers from bypass and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
systems | windows
MD5 | 5b6de1178afe2ed5b2303cbea0cbbf1d
Apple Security Advisory 2021-09-23-2
Posted Sep 24, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-23-2 - Security Update 2021-006 Catalina addresses a code execution vulnerability.

tags | advisory, code execution
systems | apple
advisories | CVE-2021-30869
MD5 | da2fbee1b8de7e4786058168460ba81d
Red Hat Security Advisory 2021-3660-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3660-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
MD5 | d1b890023c5f704258c5a41a08dd47eb
Apple Security Advisory 2021-09-23-1
Posted Sep 24, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-23-1 - iOS 12.5.5 addresses code execution, integer overflow, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple, ios
advisories | CVE-2021-30858, CVE-2021-30860, CVE-2021-30869
MD5 | 488d3765baad8c4d50fbe4155e799a1b
Red Hat Security Advisory 2021-3658-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3658-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
MD5 | 9f3015b7fb5759e48aa377a1f59a17bf
Red Hat Security Advisory 2021-3656-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3656-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
MD5 | d4e532af434c0ddf0cb26799953b9da2
Ubuntu Security Notice USN-5087-1
Posted Sep 23, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5087-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
advisories | CVE-2021-30858
MD5 | 847a422a36d646b7e940f861813e77eb
Apple Security Advisory 2021-09-20-10
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-10 - iTunes 12.12 for Windows addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | windows, apple
advisories | CVE-2021-30835, CVE-2021-30847, CVE-2021-30849
MD5 | 3e98754bf5c98c2816704d7db807c3a3
Apple Security Advisory 2021-09-20-9
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-9 - iTunes U 3.8.3 addresses a code execution vulnerability.

tags | advisory, code execution
systems | apple
advisories | CVE-2021-30862
MD5 | b21fc0fab347da30ebec7c87958382e7
Apple Security Advisory 2021-09-20-8
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-8 - Security Update 2021-005 Catalina addresses buffer overflow, bypass, code execution, denial of service, integer overflow, and out of bounds read vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2013-0340, CVE-2020-29622, CVE-2021-22925, CVE-2021-30713, CVE-2021-30783, CVE-2021-30827, CVE-2021-30828, CVE-2021-30829, CVE-2021-30830, CVE-2021-30832, CVE-2021-30835, CVE-2021-30841, CVE-2021-30842, CVE-2021-30843, CVE-2021-30844, CVE-2021-30847, CVE-2021-30850, CVE-2021-30855, CVE-2021-30857, CVE-2021-30859, CVE-2021-30860, CVE-2021-30865
MD5 | 2687d56c42a8927b7635267a708d17b5
Apple Security Advisory 2021-09-20-7
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-7 - macOS Big Sur 11.6 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds read, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2013-0340, CVE-2021-22925, CVE-2021-30827, CVE-2021-30828, CVE-2021-30829, CVE-2021-30830, CVE-2021-30832, CVE-2021-30841, CVE-2021-30842, CVE-2021-30843, CVE-2021-30844, CVE-2021-30845, CVE-2021-30847, CVE-2021-30850, CVE-2021-30853, CVE-2021-30855, CVE-2021-30857, CVE-2021-30858, CVE-2021-30859, CVE-2021-30860, CVE-2021-30865
MD5 | 13241e7baa233f6d334b704ccc309bb8
Apple Security Advisory 2021-09-20-6
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-6 - iOS 14.8 and iPadOS 14.8 addresses code execution, denial of service, integer overflow, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | apple, ios
advisories | CVE-2013-0340, CVE-2021-30820, CVE-2021-30841, CVE-2021-30842, CVE-2021-30843, CVE-2021-30846, CVE-2021-30848, CVE-2021-30849, CVE-2021-30855, CVE-2021-30857, CVE-2021-30858, CVE-2021-30859, CVE-2021-30860
MD5 | d0b20d27dd698353f67f5b99c5b4f169
Apple Security Advisory 2021-09-20-5
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-5 - Safari 15 addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2021-30846, CVE-2021-30848, CVE-2021-30849, CVE-2021-30851
MD5 | 93a4864c5af01735024cc4bbeec0c113
Sentry 8.2.0 Remote Code Execution
Posted Sep 22, 2021
Authored by Mohin Paramasivam

Sentry version 8.2.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 7ab59d06aee52c87e42e7da434c4a24b
Page 3 of 255
Back12345Next

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close