exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52,865 RSS Feed

Exploit Files

Systemd Insecure PTY Handling
Posted May 6, 2024
Authored by Adam Gowdiak | Site security-explorations.com

Systemd-run/run0 allocates user-owned ptys and attaches the slave to high privilege programs without changing ownership or locking the pty slave.

tags | exploit
SHA-256 | 15c380418f4bc926342668506e97514b64da3e44af7c265140bf54c41a2ae6b3
Microsoft PlayReady Toolkit
Posted May 6, 2024
Authored by Adam Gowdiak | Site security-explorations.com

The Microsoft PlayReady toolkit assists with fake client device identity generation, acquisition of license and content keys for encrypted content, and much more. It demonstrates weak content protection in the environment of CANAL+. The proof of concept exploit 3 year old vulnerabilities in CANAL+ STB devices, which make it possible to gain code execution access to target STB devices over an IP network.

tags | exploit, vulnerability, code execution, proof of concept
SHA-256 | 79dab3a7323f19a26d78f497deb3ea0052f2376b984ec830648a755230a60801
Docker Privileged Container Kernel Escape
Posted May 6, 2024
Authored by Eran Ayalon, Nick Cottrell, Ilan Sokol | Site metasploit.com

This Metasploit module performs a container escape onto the host as the daemon user. It takes advantage of the SYS_MODULE capability. If that exists and the linux headers are available to compile on the target, then we can escape onto the host.

tags | exploit
systems | linux
SHA-256 | 4887c5ec8feac2ef2684a86765594f2e67dc1492d28af41dbba2a666b6afd897
SOPlanning 1.52.00 SQL Injection
Posted May 3, 2024
Authored by liquidsky

SOPlanning version 1.52.00 suffers from a remote SQL injection vulnerability in projects.php.

tags | exploit, remote, php, sql injection
SHA-256 | e53b7e681658c99d38155029675c243627ca96d8d11916eba4a766fb4d6a4c69
SOPlanning 1.52.00 Cross Site Request Forgery
Posted May 3, 2024
Authored by liquidsky

SOPlanning version 1.52.00 suffers from a cross site request forgery vulnerability in xajax_server.php.

tags | exploit, php, csrf
SHA-256 | a3c73b7d4acc8e32c7247c327692a33f62025c56af9edaa24b5dfff34103fc5a
SOPlanning 1.52.00 Cross Site Scripting
Posted May 3, 2024
Authored by liquidsky

SOPlanning version 1.52.00 suffers from a cross site scripting vulnerability in groupe_save.php.

tags | exploit, php, xss
SHA-256 | b3547a84c8cad40f1ad245d4773be05f04779afc966facea5aec1efac17e152d
htmlLawed 1.2.5 Remote Command Execution
Posted May 2, 2024
Authored by d4t4s3c

htmlLawed versions 1.2.5 and below proof of concept remote command execution exploit.

tags | exploit, remote, proof of concept
advisories | CVE-2022-35914
SHA-256 | f7c13b91b7562803551ff2c81af4d91f8007cf734173bc191c1002abafa0fa8f
Packet Storm New Exploits For April, 2024
Posted May 1, 2024
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 132 exploits added to Packet Storm in April, 2024.

tags | exploit
SHA-256 | 1cc0043aef39f0e6a8dc458f9a6338f05cc6e2563d003810dff7bc61cb8fa7b7
Online Tours And Travels Management System 1.0 SQL Injection
Posted May 1, 2024
Authored by nu11secur1ty

Online Tours and Travels Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 60e4ec4738d6f6a64d63d565ba22b2f196e6175494953c8782b5d9edc6f07301
Windows PspBuildCreateProcessContext Double-Fetch / Buffer Overflow
Posted Apr 30, 2024
Authored by gabe_k

Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in PspBuildCreateProcessContext that leads to a stack buffer overflow.

tags | exploit, overflow, kernel, proof of concept
systems | windows
advisories | CVE-2024-26218
SHA-256 | 0d419f34140c82908299252d3794e80651aedada14ee132d75462cbcf8700e96
Windows NtQueryInformationThread Double-Fetch / Arbitrary Write
Posted Apr 30, 2024
Authored by gabe_k

Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in NtQueryInformationThread that leads to an arbitrary write.

tags | exploit, arbitrary, kernel, proof of concept
systems | windows
advisories | CVE-2024-21345
SHA-256 | 17303e9dc06042a7d7b761657e3f97ac797834b1b9703bc726107b814b22b014
undefinedExploiting The NT Kernel In 24H2undefined
Posted Apr 30, 2024
Authored by gabe_k

This is the full Windows privilege escalation exploit produced from the blog Exploiting the NT Kernel in 24H2: New Bugs in Old Code and Side Channels Against KASLR.

tags | exploit, kernel
systems | windows
advisories | CVE-2024-21345, CVE-2024-26218
SHA-256 | 359dac8448d7ce433fa3541cbb436c20ba5d34c9e0efb99cd95d1c887c779304
osCommerce 4 Cross Site Scripting
Posted Apr 30, 2024
Authored by CraCkEr

osCommerce version 4 suffers from a cross site scripting vulnerability. This finding is another vector of attack for this issue already discovered by the same researcher in November of 2023.

tags | exploit, xss
advisories | CVE-2024-4348
SHA-256 | f8285fdf1bc0d4437ae633d7dde7f4f607db4b9ab45579773b774ad89e950ca2
Kemp LoadMaster Unauthenticated Command Injection
Posted Apr 29, 2024
Authored by Dave Yesland | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Kemp LoadMaster in the authorization header after version 7.2.48.1. The following versions are patched: 7.2.59.2 (GA), 7.2.54.8 (LTSF), and 7.2.48.10 (LTS).

tags | exploit
advisories | CVE-2024-1212
SHA-256 | 3a721b9eae3cbcc73dbb679d3903115192bf095161310b9403ab283b1ed814f6
Doctor Appointment Management System 1.0 Cross Site Scripting
Posted Apr 29, 2024
Authored by SoSPiro

Doctor Appointment Management System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-4293
SHA-256 | 0c3515ce2c317170c7225f17f3a5d2fc73aa45477ced43b63dff0c9c028c968d
ESET NOD32 Antivirus 17.1.11.0 Unquoted Service Path
Posted Apr 29, 2024
Authored by Milad Karimi

ESET NOD32 Antivirus version 17.1.11.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | c89869f15a61fbd6e4a27d4969ac6487945ff8bbb640fcd901475febf642a0e2
PowerVR PMRMMapPMR() Writability Check
Posted Apr 25, 2024
Authored by Jann Horn, Google Security Research

PowerVR has a security issue where a writability check in PMRMMapPMR() does not clear VM_MAYWRITE.

tags | exploit
SHA-256 | 3c6be466dbc5e6f19541750720a0f82bfbd11613fafa5557f44c1df26aa893b2
Apache Solr Backup/Restore API Remote Code Execution
Posted Apr 24, 2024
Authored by jheysel-r7, l3yx | Site metasploit.com

Apache Solr versions 6.0.0 through 8.11.2 and versions 9.0.0 up to 9.4.1 are affected by an unrestricted file upload vulnerability which can result in remote code execution in the context of the user running Apache Solr. When Apache Solr creates a Collection, it will use a specific directory as the classpath and load some classes from it. The backup function of the Collection can export malicious class files uploaded by attackers to the directory, allowing Solr to load custom classes and create arbitrary Java code. Execution can further bypass the Java sandbox configured by Solr, ultimately causing arbitrary command execution.

tags | exploit, java, remote, arbitrary, code execution, file upload
advisories | CVE-2023-50386
SHA-256 | 982c87ed2032bff9e2a889f42db78ed065aa2707c068813f76b1c3875193d49d
Relate Learning And Teaching System SSTI / Remote Code Execution
Posted Apr 24, 2024
Authored by kai6u

Relate Learning and Teaching System versions prior to 2024.1 suffers from a server-side template injection vulnerability that leads to remote code execution. This particular finding targets the Batch-Issue Exam Tickets function.

tags | exploit, remote, code execution
SHA-256 | fbbdfe373b7e6dd2a583a85798dfb1937651c42dbb791999bca4e6961e2b78e0
Nginx 1.25.5 Host Header Validation
Posted Apr 24, 2024
Authored by dhteam

Nginx versions 1.25.5 and below appear to have a host header filtering validation bug that could possibly be used for malice.

tags | exploit
SHA-256 | 827499ce948db348650ea46da73de3be64bef78d4325b8fb47b1f8a618d514f3
FortiNet FortiClient EMS 7.2.2 / 7.0.10 SQL Injection / Remote Code Execution
Posted Apr 23, 2024
Authored by Spencer McIntyre, jheysel-r7, James Horseman, Zach Hanley | Site metasploit.com

A remote SQL injection vulnerability exists in FortiNet FortiClient EMS (Endpoint Management Server) versions 7.2.0 through 7.2.2 and 7.0.1 through 7.0.10. FortiClient EMS serves as an endpoint management solution tailored for enterprises, offering a centralized platform for overseeing enrolled endpoints. The SQL injection vulnerability is due to user controller strings which can be sent directly into database queries. FcmDaemon.exe is the main service responsible for communicating with enrolled clients. By default it listens on port 8013 and communicates with FCTDas.exe which is responsible for translating requests and sending them to the database. In the message header of a specific request sent between the two services, the FCTUID parameter is vulnerable to SQL injection. It can be used to enable the xp_cmdshell which can then be used to obtain unauthenticated remote code execution in the context of NT AUTHORITY\SYSTEM. Upgrading to either 7.2.3, 7.0.11 or above is recommended by FortiNet. It should be noted that in order to be vulnerable, at least one endpoint needs to be enrolled / managed by FortiClient EMS for the necessary vulnerable services to be available.

tags | exploit, remote, code execution, sql injection
advisories | CVE-2023-48788
SHA-256 | 5dc08a7c993a962915dd2867b371b86d2696d585975c16dd1ce9c50691286b53
GitLens Git Local Configuration Execution
Posted Apr 23, 2024
Authored by h00die, Paul Gerste | Site metasploit.com

GitKraken GitLens versions prior to 14.0.0 allow an untrusted workspace to execute git commands. A repo may include its own .git folder including a malicious config file to execute arbitrary code. Tested against VSCode 1.87.2 with GitLens 13.6.0 on Ubuntu 22.04 and Windows 10.

tags | exploit, arbitrary
systems | linux, windows, ubuntu
advisories | CVE-2023-46944
SHA-256 | b8273beeca3962657f6a9b1d3bfeafcc468090839b20a36ae8bb674024aa42ce
Visual Studio Code Execution
Posted Apr 23, 2024
Authored by h00die | Site metasploit.com

This Metasploit module creates a vsix file which can be installed in Visual Studio Code as an extension. At activation/install, the extension will execute a shell or two. Tested against VSCode 1.87.2 on Ubuntu 22.04.

tags | exploit, shell
systems | linux, ubuntu
SHA-256 | e6880eb05602e6f92b535b42014f6031b0323eada13388a7f9aab0f3804a2789
Gambio Online Webshop 4.9.2.0 Remote Code Execution
Posted Apr 23, 2024
Authored by h00die-gr3y, usd Herolab | Site metasploit.com

A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to run arbitrary commands via an unauthenticated HTTP POST request. The identified vulnerability within Gambio pertains to an insecure deserialization flaw, which ultimately allows an attacker to execute remote code on affected systems. The insecure deserialization vulnerability in Gambio poses a significant risk to affected systems. As it allows remote code execution, adversaries could exploit this flaw to execute arbitrary commands, potentially resulting in complete system compromise, data exfiltration, or unauthorized access to sensitive information.

tags | exploit, remote, web, arbitrary, code execution
advisories | CVE-2024-23759
SHA-256 | b039dd6352f7639972110e6885da153c2438aa56b1f4c40dc395f737607363b4
Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution
Posted Apr 23, 2024
Authored by sfewer-r7, remmons-r7 | Site metasploit.com

This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create arbitrarily named files and execute shell commands. Configuration requirements are PAN-OS with GlobalProtect Gateway or GlobalProtect Portal enabled and telemetry collection on (default). Multiple versions are affected. Payloads may take up to one hour to execute, depending on how often the telemetry service is set to run.

tags | exploit, shell, vulnerability
advisories | CVE-2024-3400
SHA-256 | 9c69f9786e45a27c7e5254838feb1083b7180cc983336792158dcfa2db1cdf80
Page 1 of 2,115
Back12345Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close