exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 69 RSS Feed

Files

Packet Storm New Exploits For May, 2024
Posted May 31, 2024
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 68 exploits added to Packet Storm in May, 2024.

tags | exploit
SHA-256 | 753ccfd5242ce49f15443887fb69c5c38c00091bb52bdafe46e28e7762f1d5c9
changedetection 0.45.20 Remote Code Execution
Posted May 31, 2024
Authored by Zach Crosman

changedetection versions 0.45.20 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2024-32651
SHA-256 | 70e710cf9046b44a8c5d97c23bc771dcb7c5a9099610fdbaebc0e275487b2eba
Online Payment Hub System 1.0 SQL Injection
Posted May 31, 2024
Authored by Hamit Avşar

Online Payment Hub System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 4961e6290d3d4553b7cf539d9befdc3d12ec735c180c3ee1a73f99cbf2eab38b
BWL Advanced FAQ Manager 2.0.3 SQL Injection
Posted May 31, 2024
Authored by Ivan Spiridonov

BWL Advanced FAQ Manager version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2024-32136
SHA-256 | f95ccaedfdaee1cf2d018058b8c73c3b7d6c5bdacad42079362785b6fa9fa81c
iMLog Cross Site Scripting
Posted May 31, 2024
Authored by Gabriel Felipe

iMLog versions prior to 1.307 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 41363b501e8b38ba3e267a44d4da15c2e44e3c8e7251c38bd295cdf08bd7d310
Check Point Security Gateway Information Disclosure
Posted May 31, 2024
Authored by Yesith Alvarez

Check Point Security Gateway suffers from an information disclosure vulnerability. Versions affected include R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.

tags | exploit, info disclosure
advisories | CVE-2024-24919
SHA-256 | 9a00e15745eee654d5e56bd4984cd3a4bdcf8830f76d50a2c9914ecf0ab23d3f
Aquatronica Control System 5.1.6 Password Disclosure
Posted May 30, 2024
Authored by LiquidWorm | Site zeroscience.mk

Aquatronica Control System version 5.1.6 has a tcp.php endpoint on the controller that is exposed to unauthenticated attackers over the network. This vulnerability allows remote attackers to send a POST request which can reveal sensitive configuration information, including plaintext passwords. This can lead to unauthorized access and control over the aquarium controller, compromising its security and potentially allowing attackers to manipulate its settings.

tags | exploit, remote, php, tcp
SHA-256 | 156dd012b72f45fad1f98bb1e1e9d6db89c8dfc2181bfdb205566cd6e184f365
Progress Flowmon 12.3.5 Local sudo Privilege Escalation
Posted May 30, 2024
Authored by Dave Yesland | Site metasploit.com

This Metasploit module abuses a feature of the sudo command on Progress Flowmon. Certain binary files are allowed to automatically elevate with the sudo command. This is based off of the file name. This includes executing a PHP command with a specific file name. If the file is overwritten with PHP code it can be used to elevate privileges to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.

tags | exploit, root, php
SHA-256 | 4d7c5d9c8f90f2082d79d0b216623a4757503aa44c96d6dd6a02243cececec08
Akaunting 3.1.8 Client-Side Template Injection
Posted May 30, 2024
Authored by tmrswrr

Akaunting version 3.1.8 suffers from a client-side template injection vulnerability.

tags | exploit
SHA-256 | 6491bd0abf8f5259e515a3521918faa0c048b25866f715b84bb84d8ae1c92170
Akaunting 3.1.8 Server-Side Template Injection
Posted May 30, 2024
Authored by tmrswrr

Akaunting version 3.1.8 suffers from a server-side template injection vulnerability.

tags | exploit
SHA-256 | a378ee9c1785e1e7d1980af6982f2f8c7d5e2cc4af0975a15adbb1c3dbea4c6e
ORing IAP-420 2.01e Cross Site Scripting / Command Injection
Posted May 30, 2024
Authored by T. Weber | Site cyberdanube.com

ORing IAP-420 version 2.01e suffers from remote command injection and persistent cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss
advisories | CVE-2024-5410, CVE-2024-5411
SHA-256 | 28abb60f6782915fe5d445adb98b15cb9953faaf9cc843956f9c44bd40922a89
Flowmon Unauthenticated Command Injection
Posted May 29, 2024
Authored by Dave Yesland | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Flowmon versions before v12.03.02.

tags | exploit
advisories | CVE-2024-2389
SHA-256 | f262ccf117a7326996b9db1324d65098a3eea5a5882162d9f1ec432434054948
Eclipse ThreadX Buffer Overflows
Posted May 28, 2024
Authored by Marco Ivaldi | Site security.humanativaspa.it

Eclipse ThreadX versions prior to 6.4.0 suffers from a missing array size check causing a memory overwrite, missing parameter checks leading to integer wraparound, under allocations, heap buffer overflows, and more.

tags | exploit, overflow
advisories | CVE-2024-2212, CVE-2024-2214, CVE-2024-2452
SHA-256 | fe024c1aec7da8d2d51940b04a8a3ca30381ec05224812e3d1fffd2e3661ce4c
HAWKI 1.0.0-beta.1 XSS / File Overwrite / Session Fixation
Posted May 28, 2024
Authored by Thorger Jansen, Florian Stuhlmann | Site sec-consult.com

HAWKI version 1.0.0-beta.1 before commit 146967f suffers from cross site scripting, arbitrary file overwrite, and session fixation vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss
advisories | CVE-2024-25975, CVE-2024-25976, CVE-2024-25977
SHA-256 | dfca73f84c2fb3bf8edc1b2f48f75be2dbaaae19ce18c9d800d8ca4a7c98f67a
Siemens CP-XXXX Series Exposed Serial Shell
Posted May 28, 2024
Authored by Gerhard Hechenberger, Steffen Robertz, Constantin Schieber-Knoebl | Site sec-consult.com

Siemens CP-XXXX Series (CP-2014, CP-2016, CP-2017, CP-2019, CP-5014) expose serial shells on multiple PLCs. A serial interface can be accessed with physical access to the PCB. After connecting to the interface, access to a shell with various debug functions as well as a login prompt is possible. The hardware is no longer produced nor offered to the market.

tags | exploit, shell
SHA-256 | 440f519186700c01806ac2012a5bbe75033e8be274d7314185fa93b11e2ef29b
ElkArte Forum 1.1.9 Remote Code Execution
Posted May 27, 2024
Authored by tmrswrr

ElkArte Forum version 1.1.9 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | a997e5df0996863611526f71121ce8640064994c237493d32774c3f309e05c10
Jcow Social Network Cross Site Scripting
Posted May 24, 2024
Authored by tmrswrr

Jcow Social Networking versions 14.2 up to 16.2.1 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8ff452224b5c44a006c708f69ef20ee895de407da9b77ccc1fefea5c2352b824
4BRO Insecure Direct Object Reference / API Information Exposure
Posted May 24, 2024
Authored by Max Rull | Site sec-consult.com

4BRO versions prior to 2024-04-17 suffer from insecure direct object reference and API information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 64654958dfdf54f7bad8c42f7237049baba8465ad1f9ae64c3a99c61e5cee06b
Debezium UI 2.5 Credential Disclosure
Posted May 24, 2024
Authored by Ihsan Cetin, Hamza Kaya Toprak

Debezium UI version 2.5 suffers from a credential disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2024-28736
SHA-256 | de2d99cea1ff19deb945b14b659e76d382f5d57f316b7dc8c8aca3034d7435af
FleetCart 4.1.1 Information Disclosure
Posted May 23, 2024
Authored by CraCkEr

FleetCart version 4.1.1 suffers from an information leakage vulnerability.

tags | exploit, info disclosure
advisories | CVE-2024-5230
SHA-256 | df07d922d5e0bd6dd265072cc317d09e41fe1ae1fb85d9021d825906e9007061
NorthStar C2 Cross Site Scripting / Code Execution
Posted May 22, 2024
Authored by h00die, chebuya | Site metasploit.com

NorthStar C2, prior to commit 7674a44 on March 11 2024, contains a vulnerability where the logs page is vulnerable to a stored cross site scripting issue. An unauthenticated user can simulate an agent registration to cause the cross site scripting attack and take over a users session. With this access, it is then possible to run a new payload on all of the NorthStar C2 compromised hosts (agents), and kill the original agent. Successfully tested against NorthStar C2 commit e7fdce148b6a81516e8aa5e5e037acd082611f73 running on Ubuntu 22.04. The agent was running on Windows 10 19045.

tags | exploit, xss
systems | linux, windows, ubuntu
advisories | CVE-2024-28741
SHA-256 | e5fdc1eb511aee9e0ced55911325ab4ed7c9efe59d20347fc192d3a17a7fa844
AVideo WWBNIndex Plugin Unauthenticated Remote Code Execution
Posted May 22, 2024
Authored by Valentin Lobstein | Site metasploit.com

This Metasploit module exploits an unauthenticated remote code execution vulnerability in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the submitIndex.php file, where user-supplied input is passed directly to the require() function without proper sanitization. By exploiting this, an attacker can leverage the PHP filter chaining technique to execute arbitrary PHP code on the server. This allows for the execution of commands and control over the affected system. The exploit is particularly dangerous because it does not require authentication, making it possible for any remote attacker to exploit this vulnerability.

tags | exploit, remote, arbitrary, php, code execution
advisories | CVE-2024-31819
SHA-256 | 7df90df7e75927e09777170cc36a4823a5062bc6e077056564aea5f7a6ba8b7f
Chat Bot 1.0 SQL Injection
Posted May 22, 2024
Authored by nu11secur1ty

Chat Bot version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 49ddf48680164af066978efabddac4f15a73ca97d2e553446260cc4ca68b75d9
CHAOS 5.0.8 Cross Site Scripting / Remote Command Execution
Posted May 21, 2024
Authored by h00die, chebuya | Site metasploit.com

CHAOS version 5.0.8 is a free and open-source Remote Administration Tool that allows generated binaries to control remote operating systems. The web application contains a remote command execution vulnerability which can be triggered by an authenticated user when generating a new executable. The web application also contains a cross site scripting vulnerability within the view of a returned command being executed on an agent.

tags | exploit, remote, web, xss
advisories | CVE-2024-30850, CVE-2024-31839
SHA-256 | f57ebc1eae72783c36ac9e3df7805d9879e3d1ced0b8232ea872b32518252dce
Joomla 4.2.8 Information Disclosure
Posted May 21, 2024
Authored by d4t4s3c

Joomla versions 4.2.8 and below remote unauthenticated information disclosure exploit.

tags | exploit, remote, info disclosure
advisories | CVE-2023-23752
SHA-256 | 626134242ae4ae7b4c28853f3d05cf44659ed92ca2ceb96b914b80675d522cdc
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close