exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54,495 RSS Feed

Exploit Files

Siemens Energy Omnivise T3000 8.2 SP3 Privilege Escalation / File Download
Posted Nov 14, 2024
Authored by Andreas Kolbeck, Steffen Robertz | Site sec-consult.com

Siemens Energy Omnivise T3000 version 8.2 SP3 suffers from local privilege escalation, cleartext storage of passwords in configuration and log files, file system access allowing for arbitrary file download, and IP whitelist bypass.

tags | exploit, arbitrary, local
advisories | CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879
SHA-256 | f3ace4f4cb5b84a560a9593357976ec236f7e116327a16dffefa142cb8440217
TX Text Control .NET Server For ASP.NET Arbitrary File Read / Write
Posted Nov 14, 2024
Authored by Filip Palian

TX Text Control .NET Server For ASP.NET has an issue where it was possible to change the configured system path for reading and writing files in the underlying operating system with privileges of the user running a web application.

tags | exploit, web, asp
SHA-256 | 87daef249524395b391c7767b295ddf96c40db5d4fbd376c76c034cc5844d043
GravCMS 1.10.7 Arbitrary YAML Write / Update
Posted Nov 14, 2024
Site github.com

Proof of concept remote code execution exploit for GravCMS 1.10.7 that leverages an arbitrary YAML write / update.

tags | exploit, remote, arbitrary, code execution, proof of concept
advisories | CVE-2021-21425
SHA-256 | 5cb1696418ca010542d02a039fd2e7ced0fb5abc292d2bf9e447350af4776e32
PHP-CGI Argument Injection Remote Code Execution
Posted Nov 14, 2024
Authored by BTtea | Site github.com

Proof of concept remote code execution exploit for PHP-CGI that affects versions 8.1 before 8.1.29, 8.2 before 8.2.20, and 8.3 before 8.3.8.

tags | exploit, remote, cgi, php, code execution, proof of concept
advisories | CVE-2024-4577
SHA-256 | a6b63ce9c93a3021236a9a584571d58798fe9d500b30228bb2141feca495c4d9
Palo Alto Expedition 1.2.91 Remote Code Execution
Posted Nov 13, 2024
Authored by Enrique Castillo, Zach Hanley, Michael Heinzl | Site metasploit.com

This Metasploit module lets you obtain remote code execution in Palo Alto Expedition versions 1.2.91 and below. The first vulnerability, CVE-2024-5910, allows to reset the password of the admin user, and the second vulnerability, CVE-2024-9464, is an authenticated OS command injection. In a default installation, commands will get executed in the context of www-data. When credentials are provided, this module will only exploit the second vulnerability. If no credentials are provided, the module will first try to reset the admin password and then perform the OS command injection.

tags | exploit, remote, code execution
advisories | CVE-2024-24809, CVE-2024-5910
SHA-256 | df2c6c91b0ec6249f500e20b70f386982ccf89ee425960ccceff8fd524cb14ff
HASOMED Elefant / Elefant Software Updater Data Exposure / Privilege Escalation
Posted Nov 11, 2024
Authored by Daniel Hirschberger, Florian Stuhlmann | Site sec-consult.com

HASOMED Elefant versions prior to 24.04.00 and Elefant Software Updater versions prior to 1.4.2.1811 suffer from having an unprotected exposed firebird database, unprotected FHIR API, multiple local privilege escalation, and hardcoded service password vulnerabilities.

tags | exploit, local, vulnerability
advisories | CVE-2024-50588, CVE-2024-50589, CVE-2024-50590, CVE-2024-50591, CVE-2024-50592, CVE-2024-50593
SHA-256 | 08569aaf8d9ee2326579f45288b32f5dc1f2f9623687358b993634b1d5424d28
WSO2 4.0.0 / 4.1.0 / 4.2.0 Shell Upload
Posted Nov 11, 2024
Site github.com

WS02 versions 4.0.0, 4.1.0, and 4.2.0 are susceptible to remote code execution via an arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, code execution, file upload
SHA-256 | 88bbb0e549a78d6ccac8792066a572155603f8e8b352a29a78237e92f01cd2a7
WordPress Meetup 0.1 Authentication Bypass
Posted Nov 7, 2024
Site github.com

WordPress Meetup plugin versions 0.1 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2024-50483
SHA-256 | 89ac429be4764b94bf641a570c41c31bddf5b9a683ddf1aeac67f0ca453b0bb8
CyberPanel upgrademysqlstatus Arbitrary Command Execution
Posted Nov 7, 2024
Site github.com

Proof of concept remote command execution exploit for CyberPanel versions prior to 5b08cd6.

tags | exploit, remote, proof of concept
advisories | CVE-2024-51567
SHA-256 | cc940e99f4e4ef4ac83ab7b84fe7d3f90ff95549ed54049913abec4f7582bf85
TestRail CLI FieldsParser eval Injection
Posted Nov 7, 2024

While parsing test result XML files with the TestRail CLI, the presence of certain TestRail-specific fields can cause untrusted data to flow into an eval() statement, leading to arbitrary code execution. In order to exploit this, an attacker would need to be able to cause the TestRail CLI to parse a malicious XML file. Normally an attacker with this level of control would already have other avenues of gaining code execution.

tags | exploit, arbitrary, code execution
SHA-256 | 23defc505c60d8487fbaa6cc446dcdfe879f30097f49592151de5e51f416f7ff
ABB Cylon Aspect 3.08.00 Off-By-One
Posted Nov 5, 2024
Authored by LiquidWorm | Site zeroscience.mk

A vulnerability was identified in a ABB Cylon Aspect version 3.08.00 where an off-by-one error in array access could lead to undefined behavior and potential denial of service. The issue arises in a loop that iterates over an array using a less than or equals to condition, allowing access to an out-of-bounds index. This can trigger errors or unexpected behavior when processing data, potentially crashing the application. Successful exploitation of this vulnerability can lead to a crash or disruption of service, especially if the script handles large data sets.

tags | exploit, denial of service
SHA-256 | cf7a464a832c331d5e74a3f9a20a0ce04cd242617d7e01d8ab91b2b7fb424cd1
Sysax Multi Server 6.99 SSH Denial Of Service
Posted Nov 4, 2024
Authored by Yehia Elghaly

Sysax Multi Server version 6.9.9 suffers from an SSH related denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | ebc9a93344fb5bef008bc0309e3cf33cd4eddd71fd9d24157cf66c96571e5f7b
Sysax Multi Server 6.99 Cross Site Scripting
Posted Nov 4, 2024
Authored by Yehia Elghaly

Sysax Multi Server version 6.9.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d688c8aa11a70ff0b0715421045afb02b7b5d18529b051e978c77bd918407bc5
IBM Security Verify Access 32 Vulnerabilities
Posted Nov 4, 2024
Authored by Pierre Kim | Site pierrekim.github.io

IBM Security Verify Access versions prior to 10.0.8 suffer from authentication bypass, reuse of private keys, local privilege escalation, weak settings, outdated libraries, missing password, hardcoded secrets, remote code execution, missing authentication, null pointer dereference, and lack of privilege separation vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution
advisories | CVE-2022-2068, CVE-2023-30997, CVE-2023-30998, CVE-2023-31001, CVE-2023-31004, CVE-2023-31005, CVE-2023-31006, CVE-2023-32328, CVE-2023-32329, CVE-2023-32330, CVE-2023-38267, CVE-2023-38368, CVE-2023-38369, CVE-2023-38370
SHA-256 | bbe5e2c1ca7d3b42c24076cc8aa46544dec9bd260d2ef8b56f24a6ec52ecd952
IBM Security Verify Access Appliance Insecure Transit / Hardcoded Passwords
Posted Nov 4, 2024
Authored by Pierre Kim | Site pierrekim.github.io

IBM Security Verify Access Appliance suffers from multiple insecure transit vulnerabilities, hardcoded passwords, and uninitialized variables. ibmsecurity versions prior to 2024.4.5 are affected.

tags | exploit, vulnerability
advisories | CVE-2024-31871, CVE-2024-31872, CVE-2024-31873, CVE-2024-31874
SHA-256 | 938bde01e4fdd9ce1c3698333190a685348457736b7db8df0f3db5ed879e5675
ESET NOD32 Antivirus 18.0.12.0 Unquoted Service Path
Posted Nov 4, 2024
Authored by Milad Karimi

ESET NOD32 Antivirus version 18.0.12.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | d48a31f2b811f4e6332d799099fcdee648d31c4c59eca77224f4eb7f01c7f161
SQLite3 generate_series Stack Buffer Underflow
Posted Nov 4, 2024
Authored by Google Security Research, Glazvunov

SQLite3 suffers from a stack buffer underflow condition in seriesBestIndex in the generate_series extension.

tags | exploit
SHA-256 | 7e10b24906e04816e624fc48916e56477f071a9fab7ccffed58b4658d09bf483
Linux khugepaged Race Conditions
Posted Nov 4, 2024
Authored by Jann Horn, Google Security Research

khugepaged in Linux races with rmap-based zap, races with GUP-fast, and fails to call MMU notifiers.

tags | exploit
systems | linux
advisories | CVE-2022-48991
SHA-256 | 70b8b4891864d68dc660a11b7c18246507754b38f9be401d06a0d1879b3a45cc
Ping Identity PingIDM 7.5.0 Query Filter Injection
Posted Nov 1, 2024
Authored by Miguel García Martín, Ksandros Apostoli | Site sec-consult.com

Ping Identity PingIDM versions 7.0.0 through 7.5.0 enabled an attacker with read access to the User collection, to abuse API query filters in order to obtain managed and/or internal user's passwords in either plaintext or encrypted variants, based on configuration. The API clearly prevents the password in either plaintext or encrypted to be retrieved by any other means, as this field is set as protected under the User object. However, by injecting a malicious query filter, using password as the field to be filtered, an attacker can perform a blind brute-force on any victim's user password details (encrypted object or plaintext string).

tags | exploit
advisories | CVE-2024-23600
SHA-256 | 794244004a3908d9cf0034a1a70db151caa9281755a9275a47220eac8338d52f
ABB Cylon Aspect 3.08.01 File Upload MD5 Checksum Bypass
Posted Nov 1, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.08.01 has a vulnerability in caldavInstall.php, caldavInstallAgendav.php, and caldavUpload.php files, where the presence of an EXPERTMODE parameter activates a badassMode feature. This mode allows an unauthenticated attacker to bypass MD5 checksum validation during file uploads. By enabling badassMode and setting the skipChecksum parameter, the system skips integrity verification, allowing attackers to upload or install altered CalDAV zip files without authentication. This vulnerability permits unauthorized file modifications, potentially exposing the system to tampering or malicious uploads.

tags | exploit, php, file upload
SHA-256 | accf80983115dc5908f4545001f436450bd05752c8b5b6b674a1efd83446277b
Packet Storm New Exploits For October, 2024
Posted Nov 1, 2024
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 128 exploits added to Packet Storm in October, 2024.

tags | exploit
SHA-256 | c5d403957b806b59fb6166e8d1326d5963ba8bbcdb7a6478a93b1ba29c457234
SmartAgent 1.1.0 Remote Code Execution
Posted Nov 1, 2024
Authored by Alter Prime

SmartAgent version 1.1.0 suffers from an unauthenticated remote code execution vulnerability in youtubeInfo.php.

tags | exploit, remote, php, code execution
SHA-256 | d1c79ff390d1eddef9aea5b0debce0087e67faf0b8c82c4f6c4ee4fde8484a34
SmartAgent 1.1.0 Server-Side Request Forgery
Posted Nov 1, 2024
Authored by Alter Prime

SmartAgent version 1.1.0 suffers from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | c819a531ddac42276178e8777f908cca9b2430a5fef86c2ac4c3be219a2bd9e3
SmartAgent 1.1.0 SQL Injection
Posted Nov 1, 2024
Authored by Alter Prime

SmartAgent version 1.1.0 suffers from multiple unauthenticated remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 454076f23b89f57e45086d97afc09d37ad082fe918f4d6e98b97f0605eece69e
WordPress Automatic 3.92.0 Path Traversal / Server-Side Request Forgery
Posted Oct 31, 2024
Authored by Quantum-Hacker | Site github.com

WordPress Automatic plugin versions 3.92.0 and below proof of concept exploit that demonstrates path traversal and server-side request forgery vulnerabilities.

tags | exploit, vulnerability, proof of concept
advisories | CVE-2024-27954
SHA-256 | 1e3ab221180e7f26ab2127194c4584fbb6f05727c5578c16eb87089046795a1e
Page 1 of 2,180
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close