exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53,217 RSS Feed

Exploit Files

WordPress Shield Security 20.0.5 Cross Site Scripting
Posted Aug 16, 2024
Authored by Wayne-Kerr, Tim Lepp | Site github.com

WordPress Shield Security plugin versions 20.0.5 and below cross site scripting exploit that adds an administrative user.

tags | exploit, xss
advisories | CVE-2024-7313
SHA-256 | 705e2276f9150db10c6e5b1e68e86831e4cde8ecf32c63988f9cecbbcc2e80d0
Build Your Own Botnet 2.0.0 Remote Code Execution
Posted Aug 16, 2024
Authored by chebuya

Build Your Own Botnet (BYOB) version 2.0.0 exploit that works by spoofing an agent callback to overwrite the sqlite database and bypass authentication and exploiting an authenticated command injection in the payload builder page.

tags | exploit, spoof
SHA-256 | 1a82566a9936be9ad74813ab1ab487efa90c117fb11b2d1dcb2897c0a8093afe
Insurance 1.2 Insecure Settings
Posted Aug 16, 2024
Authored by indoushka

Insurance version 1.2 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 6c9cae927874e9bb8f72a2161ca3b5dd9f0c9e51e35775faf16093ac8dd4bce4
Human Resource Management System 2024 1.0 SQL Injection
Posted Aug 16, 2024
Authored by indoushka

Human Resource Management System 2024 version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 3800f1816111f1edbb9091c2250c05c9601784c51aa09742476281c2862e85c3
Hotel Management System 1.0 SQL Injection
Posted Aug 16, 2024
Authored by indoushka

Hotel Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 2536c30b03f92e1a431ba68657f0b804165f343b2b4f604f1211f7bfc5be9a1a
Hotel Booking System 1.0 Shell Upload
Posted Aug 16, 2024
Authored by indoushka

Hotel Booking System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 30e109a72aa50be38d3b11de95969eede34fe16c3710c319c4bd7d3b9aaf5378
Home Owners Collection Management System 1.0 Insecure Settings
Posted Aug 16, 2024
Authored by indoushka

Home Owners Collection Management System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 94fb8d8c82f8132953cb67c97a9b682c8e63a436a475a575173b89ddf54daa9f
Giftora 1.0 Cross Site Scripting
Posted Aug 16, 2024
Authored by indoushka

Giftora version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 571b1691f68912443e4375f4b2eeed71940910d33468d76246e2f0a264a6ff84
Bhojon Restaurant Management System 3.0 Insecure Direct Object Reference
Posted Aug 16, 2024
Authored by indoushka

Bhojon Restaurant Management System version 3.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 98c12c7a5556d4399b71f053e8f21eaf5c59e49e15d4bf7f6b1980de56fec3c2
LG Simple Editor 3.21.0 Command Injection
Posted Aug 15, 2024
Authored by rgod, Michael Heinzl | Site metasploit.com

LG Simple Editor versions 3.21.0 and below suffer from an unauthenticated command injection vulnerability. The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\SYSTEM.

tags | exploit, remote, arbitrary
advisories | CVE-2023-40504
SHA-256 | 1545a24bd538b0cf083c22f759cc58d69ea50fc039903cf220c2e8a20cefba46
OpenMetadata 1.2.3 Authentication Bypass / SpEL Injection
Posted Aug 15, 2024
Authored by Alvaro Munoz, h00die-gr3y | Site metasploit.com

This Metasploit module exploits OpenMetadata versions 1.2.3 and below by chaining an API authentication bypass using JWT tokens along with a SpEL injection vulnerability to achieve arbitrary command execution.

tags | exploit, arbitrary
advisories | CVE-2024-28254, CVE-2024-28255
SHA-256 | 713b618c2038aeb7f9469836947b05f8ccdf1cf0b8060c24f46869e85e9e93cd
Apache HugeGraph Gremlin Remote Code Execution
Posted Aug 15, 2024
Authored by jheysel-r7, 6right | Site metasploit.com

This Metasploit module exploits CVE-2024-27348, a remote code execution vulnerability that exists in Apache HugeGraph Server in versions before 1.3.0. An attacker can bypass the sandbox restrictions and achieve remote code execution through Gremlin, resulting in complete control over the server.

tags | exploit, remote, code execution
advisories | CVE-2024-27348
SHA-256 | b97d3ebb5977b249d01dc6eda8963e68e3e2fb294c007a301ee0a7f467c4e02d
Feberr 13.4 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Feberr version 13.4 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 2e393c441ce609493774dac1c3e5f681c5ce98d1b3702bb114041fdb03335768
Farmacia Gama 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Farmacia Gama version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2caf36ad25ddb5e5fcd4a26fd8ac2e62e0dee3d76fbd95e698130d2b8730632e
Ecommerce 1.15 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Ecommerce version 1.15 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 58fa74be204710f788c9686f571d322e9e021b828a468d977d0fd4a321e926aa
Covid-19 Contact Tracing System 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Covid-19 Contact Tracing System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | daa17a59d2ea2f605f71d11b3ba6860a33f90c5ea08d666ce8a3af42e59af5fa
Car Rental Management System 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Car Rental Management System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5fa10fefdc9cde30dce20a655fe24cebef24d4c036fcbee0b4bb1c708bc895ed
BloodBank 1.1 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

BloodBank version 1.1 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | e7484cc3dee661f45c55f97b4e23233108b80b1c4fe04adf3e05b62052052b97
Bhojon Restaurant Management System 2.9 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Bhojon Restaurant Management System version 2.9 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | d6e06dde4900dda1d73c9d43d3fd7bdc675753e54128cdc173c7bd195c2bae96
FlatPress 1.3.1 Path Traversal
Posted Aug 15, 2024
Authored by indoushka

FlatPress version 1.3.1 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 93132facf1686cadc1ae8f70b92c43ad1314fd717d542ca0f3d2460a2af23e80
K7 Ultimate Security NULL Pointer Dereference
Posted Aug 14, 2024
Authored by M. Akil Gündoğan

In K7 Ultimate Security versions prior to 17.0.2019, the driver file (K7RKScan.sys - this version 15.1.0.7) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of a null pointer dereference from IOCtl 0x222010 and 0x222014. At the same time, the drive is accessible to all users in the "Everyone" group.

tags | exploit, denial of service, local
advisories | CVE-2024-36424
SHA-256 | bfb4ecddc23a05440389081ce78b782dbf92b391de062ebc99d6641e95cdaa89
Microsoft CLFS.sys Denial of Service
Posted Aug 14, 2024
Authored by ricnar456 | Site github.com

CVE-2024-6768 is a vulnerability in the Common Log File System (CLFS.sys) driver of Windows, caused by improper validation of specified quantities in input data. This flaw leads to an unrecoverable inconsistency, triggering the KeBugCheckEx function and resulting in a Blue Screen of Death (BSoD). The issue affects all versions of Windows 10 and Windows 11, Windows Server 2016, Server 2019 and Server 2022 despite having all updates applied. This Proof of Concept (PoC) shows that by crafting specific values within a .BLF file, an unprivileged user can induce a system crash.

tags | exploit, proof of concept
systems | windows
advisories | CVE-2024-6768
SHA-256 | 0ec1d82e1e6a31fe57b2e6f518e950e98281a0c7e322246a6ffaddcc34e5296a
Kortex 1.0 Insecure Direct Object Reference
Posted Aug 14, 2024
Authored by indoushka

Kortex version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | b5387d8bfce8e3033d7413641e3e9b7894ff5bafea17fd748b642abf24fa1ae8
Job Castle 1.0 Arbitrary File Upload
Posted Aug 14, 2024
Authored by indoushka

Job Castle version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | f14162d4a77d52793d3dc53ca757b4ad8ff9f17c72b6660e345b95221d53f069
Hotel Management System 1.0 Arbitrary File Upload
Posted Aug 14, 2024
Authored by indoushka

Hotel Management System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 819229d02bda3fa9cbbbd2bfee66fb703e22843e42837d98eb5585d72f9f8570
Page 1 of 2,129
Back12345Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close