what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53,073 RSS Feed

Exploit Files

Prison Management System 1.0 Shell Upload
Posted Jul 25, 2024
Authored by Muhammet Ali Dak

Prison Management System version 1.0 suffers from an unauthenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 86134abe13930c15d9a0ec6d1f20f1dd3360b399fa96b4ae5b5821bcc9112abb
Multi Store Inventory Management System 1.0 Insecure Direct Object Reference
Posted Jul 25, 2024
Authored by indoushka

Multi Store Inventory Management System version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 32be0fec962b67faf38d315a9d6d5a0c83204e2e599b0319b92fa81fc435926a
Online Medicine Ordering System 1.0 Insecure Settings
Posted Jul 25, 2024
Authored by indoushka

Online Medicine Ordering System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 7090509e3ce57fb3261f901f4ff5ef2de114d829ff21d92d10a1d57a383ca778
Online Discussion Forum Site 1.0 Insecure Settings
Posted Jul 25, 2024
Authored by indoushka

Online Discussion Forum Site version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 92cd4f5555edbdf20382fd693914227b5cc4481eea37c2551c0e35cb1a803e77
LMS ZAI 6.3 Insecure Settings
Posted Jul 25, 2024
Authored by indoushka

LMS ZAI version 6.3 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 5e906c00d1ca8a906265bb98c2236832d82d0f3cc3a33174259834d98e4ae184
Ingredient Stock Management System 1.0 Insecure Settings
Posted Jul 25, 2024
Authored by indoushka

Ingredient Stock Management System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | a4c31731e3961ba07b1da4ca7b7273990ac0156f6765916f333ed048fa56ce25
ChatBot Application With A Suggestion Feature 1.0 Insecure Settings
Posted Jul 25, 2024
Authored by indoushka

ChatBot Application with a Suggestion Feature version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | ec18e52270e06fbce388ad46550cdd2965590cfdcc8d8666221231be7c95b7af
Bhojon Restaurant Management System 2.7 Insecure Direct Object Reference
Posted Jul 25, 2024
Authored by indoushka

Bhojon restaurant management system version 2.7 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 4141a17578239f97e0525152779108e69e6941844f0e6c5f4301e3e30bcbacc0
SIM Wisuda 1.0 Insecure Direct Object Reference
Posted Jul 24, 2024
Authored by indoushka

SIM Wisuda version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 7fed84c74a95aca63927ebf377895e9a07606b145886012809d45f932101a348
SLiMS CMS 2.0 SQL Injection
Posted Jul 24, 2024
Authored by indoushka

SLiMS CMS version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 40690990f8e7a9d69ac2a7722849376b960091b3430423c391d36914318f58b7
StarTask CRM 1.9 SQL Injection
Posted Jul 24, 2024
Authored by indoushka

StarTask CRM version 1.9 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 6e2fd2cbf7c7bffe7c302d4b461bf6f489fbda9665b18dc56c36e3c574b89861
UBM CMS 1.2 Insecure Direct Object Reference
Posted Jul 24, 2024
Authored by indoushka

UBM CMS version 1.2 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | ca7cdb66f2dc41183a9aa7df2672ee5767e95408be450748fad9f7991aa97729
TAIF LMS 5.8.0 Shell Upload
Posted Jul 24, 2024
Authored by indoushka

TAIF LMS version 5.8.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | ba349faa2be4ef714aa164c5655faad9e8a44e970f5e25e60f66cee08f658427
Vencorp 2.1.1 SQL Injection
Posted Jul 24, 2024
Authored by indoushka

Vencorp version 2.1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 1efa85ad70e114a1d0f8dac25bda7b473b55d33338cbdef57caf77c451658123
Webdenim AppUI 1.0 Insecure Direct Object Reference
Posted Jul 24, 2024
Authored by indoushka

Webdenim AppUI version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 3418251e6b23a29fe38369d103a67d4c4c7e084f78a767a8b4660ce397493457
Perten Instruments Process Plus Software 1.11.6507.0 LFI / Hardcoded Credentials
Posted Jul 23, 2024
Authored by T. Weber, S. Dietz | Site cyberdanube.com

Perten Instruments Process Plus Software versions 1.11.6507.0 and below suffer from local file inclusion, hardcoded credential, and execution with unnecessary privilege vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
advisories | CVE-2024-6911, CVE-2024-6912, CVE-2024-6913
SHA-256 | 92c6be9a95dec36f75c305fd1ec54275736478e25459c036cab67f945826b0f2
LMS ZAI 6.1 Insecure Settings
Posted Jul 23, 2024
Authored by indoushka

LMS ZAI version 6.1 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | ac6f91ffe20c571e57ac0c8a6aef0c5437b2d37e5f53c46ef41059f24100b7db
Quick Job 2.4 Insecure Direct Object Reference
Posted Jul 23, 2024
Authored by indoushka

Quick Job version 2.4 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | ed619defcb18f94880d7fdc150758b05fc052d89b88cf6c32eda99ac714a326b
PPDB ONLINE 1.3 Administrative Page Disclosure
Posted Jul 23, 2024
Authored by indoushka

PPDB ONLINE version 1.3 appears to suffer from an administrative page disclosure issue.

tags | exploit, info disclosure
SHA-256 | 567512dc29f3191d46966af5a6dd1339474aa567f65e1c6564dccda43acadad3
PHP MaXiMuS 2.5.2 Cross Site Scripting
Posted Jul 23, 2024
Authored by indoushka

PHP MaXiMuS version 2.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | f7f012f0611c7ac312b6b0ad3df48db019ad64a1683b0a0e3c97146f444edd95
NUKE SENTINEL 2.5.2 Cross Site Scripting
Posted Jul 23, 2024
Authored by indoushka

NUKE SENTINEL version 2.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 04959e224e4d66c86926b38e058df306a652f0dbf3a13e5a864ba731b33ed47c
Minfotech CMS 2.0 SQL Injection
Posted Jul 23, 2024
Authored by indoushka

Minfotech CMS version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c70371f0daa1616ffe4fc66938a433e31d91535c9593510fb4fccef1fdbc587e
eDesign CMS 2.0 Insecure Direct Object Reference
Posted Jul 23, 2024
Authored by indoushka

eDesign CMS version 2.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 55a4eca00e7267d8d4d5cdd94c2b99447eef8059c06cab914a3401ebda7966f2
Softing Secure Integration Server 1.22 Remote Code Execution
Posted Jul 22, 2024
Authored by mr_me, Chris Anastasio, Imran E. Dawoodjee | Site metasploit.com

This Metasploit module chains two vulnerabilities to achieve authenticated remote code execution against Softing Secure Integration Server version 1.22. In CVE-2022-1373, the restore configuration feature is vulnerable to a directory traversal vulnerability when processing zip files. When using the "restore configuration" feature to upload a zip file containing a path traversal file which is a dll called ..\..\..\..\..\..\..\..\..\..\..\Windows\System32\wbem\wbemcomn.dll. This causes the file C:\Windows\System32\wbem\wbemcomn.dll to be created and executed upon touching the disk. In CVE-2022-2334, the planted wbemcomn.dll is used in a DLL hijacking attack when Softing Secure Integration Server restarts upon restoring configuration, which allows us to execute arbitrary code on the target system. The chain demonstrated in Pwn2Own used a signature instead of a password. The signature was acquired by running an ARP spoofing attack against the local network where the Softing SIS server was located. A username is also required for signature authentication. A custom DLL can be provided to use in the exploit instead of using the default MSF-generated one.

tags | exploit, remote, arbitrary, local, spoof, vulnerability, code execution
systems | windows
advisories | CVE-2022-1373, CVE-2022-2334
SHA-256 | 138c45447c1d3fa090b4666327e202412f377f34d7873c3c578299783f2b2a43
Ghostscript Command Execution / Format String
Posted Jul 22, 2024
Authored by Thomas Rinsma, Christophe de la Fuente | Site metasploit.com

This Metasploit module exploits a format string vulnerability in Ghostscript versions before 10.03.1 to achieve a SAFER sandbox bypass and execute arbitrary commands. This vulnerability is reachable via libraries such as ImageMagick. This exploit only works against Ghostscript versions 10.03.0 and 10.01.2. Some offsets adjustment will probably be needed to make it work with other versions.

tags | exploit, arbitrary
advisories | CVE-2024-29510
SHA-256 | 3e3f414d0ec3165e352b2624a3e784100a79ab838c827536fa557daa6cf4b2b8
Page 1 of 2,123
Back12345Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close