This archive contains all of the 68 exploits added to Packet Storm in May, 2024.
753ccfd5242ce49f15443887fb69c5c38c00091bb52bdafe46e28e7762f1d5c9
changedetection versions 0.45.20 and below suffer from a remote code execution vulnerability.
70e710cf9046b44a8c5d97c23bc771dcb7c5a9099610fdbaebc0e275487b2eba
Online Payment Hub System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
4961e6290d3d4553b7cf539d9befdc3d12ec735c180c3ee1a73f99cbf2eab38b
BWL Advanced FAQ Manager version 2.0.3 suffers from a remote SQL injection vulnerability.
f95ccaedfdaee1cf2d018058b8c73c3b7d6c5bdacad42079362785b6fa9fa81c
iMLog versions prior to 1.307 suffer from a persistent cross site scripting vulnerability.
41363b501e8b38ba3e267a44d4da15c2e44e3c8e7251c38bd295cdf08bd7d310
Check Point Security Gateway suffers from an information disclosure vulnerability. Versions affected include R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.
9a00e15745eee654d5e56bd4984cd3a4bdcf8830f76d50a2c9914ecf0ab23d3f
Aquatronica Control System version 5.1.6 has a tcp.php endpoint on the controller that is exposed to unauthenticated attackers over the network. This vulnerability allows remote attackers to send a POST request which can reveal sensitive configuration information, including plaintext passwords. This can lead to unauthorized access and control over the aquarium controller, compromising its security and potentially allowing attackers to manipulate its settings.
156dd012b72f45fad1f98bb1e1e9d6db89c8dfc2181bfdb205566cd6e184f365
This Metasploit module abuses a feature of the sudo command on Progress Flowmon. Certain binary files are allowed to automatically elevate with the sudo command. This is based off of the file name. This includes executing a PHP command with a specific file name. If the file is overwritten with PHP code it can be used to elevate privileges to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.
4d7c5d9c8f90f2082d79d0b216623a4757503aa44c96d6dd6a02243cececec08
Akaunting version 3.1.8 suffers from a client-side template injection vulnerability.
6491bd0abf8f5259e515a3521918faa0c048b25866f715b84bb84d8ae1c92170
Akaunting version 3.1.8 suffers from a server-side template injection vulnerability.
a378ee9c1785e1e7d1980af6982f2f8c7d5e2cc4af0975a15adbb1c3dbea4c6e
ORing IAP-420 version 2.01e suffers from remote command injection and persistent cross site scripting vulnerabilities.
28abb60f6782915fe5d445adb98b15cb9953faaf9cc843956f9c44bd40922a89
This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Flowmon versions before v12.03.02.
f262ccf117a7326996b9db1324d65098a3eea5a5882162d9f1ec432434054948
Eclipse ThreadX versions prior to 6.4.0 suffers from a missing array size check causing a memory overwrite, missing parameter checks leading to integer wraparound, under allocations, heap buffer overflows, and more.
fe024c1aec7da8d2d51940b04a8a3ca30381ec05224812e3d1fffd2e3661ce4c
HAWKI version 1.0.0-beta.1 before commit 146967f suffers from cross site scripting, arbitrary file overwrite, and session fixation vulnerabilities.
dfca73f84c2fb3bf8edc1b2f48f75be2dbaaae19ce18c9d800d8ca4a7c98f67a
Siemens CP-XXXX Series (CP-2014, CP-2016, CP-2017, CP-2019, CP-5014) expose serial shells on multiple PLCs. A serial interface can be accessed with physical access to the PCB. After connecting to the interface, access to a shell with various debug functions as well as a login prompt is possible. The hardware is no longer produced nor offered to the market.
440f519186700c01806ac2012a5bbe75033e8be274d7314185fa93b11e2ef29b
ElkArte Forum version 1.1.9 suffers from a remote code execution vulnerability.
a997e5df0996863611526f71121ce8640064994c237493d32774c3f309e05c10
Jcow Social Networking versions 14.2 up to 16.2.1 suffer from a persistent cross site scripting vulnerability.
8ff452224b5c44a006c708f69ef20ee895de407da9b77ccc1fefea5c2352b824
4BRO versions prior to 2024-04-17 suffer from insecure direct object reference and API information disclosure vulnerabilities.
64654958dfdf54f7bad8c42f7237049baba8465ad1f9ae64c3a99c61e5cee06b
Debezium UI version 2.5 suffers from a credential disclosure vulnerability.
de2d99cea1ff19deb945b14b659e76d382f5d57f316b7dc8c8aca3034d7435af
FleetCart version 4.1.1 suffers from an information leakage vulnerability.
df07d922d5e0bd6dd265072cc317d09e41fe1ae1fb85d9021d825906e9007061
NorthStar C2, prior to commit 7674a44 on March 11 2024, contains a vulnerability where the logs page is vulnerable to a stored cross site scripting issue. An unauthenticated user can simulate an agent registration to cause the cross site scripting attack and take over a users session. With this access, it is then possible to run a new payload on all of the NorthStar C2 compromised hosts (agents), and kill the original agent. Successfully tested against NorthStar C2 commit e7fdce148b6a81516e8aa5e5e037acd082611f73 running on Ubuntu 22.04. The agent was running on Windows 10 19045.
e5fdc1eb511aee9e0ced55911325ab4ed7c9efe59d20347fc192d3a17a7fa844
This Metasploit module exploits an unauthenticated remote code execution vulnerability in the WWBNIndex plugin of the AVideo platform. The vulnerability exists within the submitIndex.php file, where user-supplied input is passed directly to the require() function without proper sanitization. By exploiting this, an attacker can leverage the PHP filter chaining technique to execute arbitrary PHP code on the server. This allows for the execution of commands and control over the affected system. The exploit is particularly dangerous because it does not require authentication, making it possible for any remote attacker to exploit this vulnerability.
7df90df7e75927e09777170cc36a4823a5062bc6e077056564aea5f7a6ba8b7f
Chat Bot version 1.0 suffers from a remote SQL injection vulnerability.
49ddf48680164af066978efabddac4f15a73ca97d2e553446260cc4ca68b75d9
CHAOS version 5.0.8 is a free and open-source Remote Administration Tool that allows generated binaries to control remote operating systems. The web application contains a remote command execution vulnerability which can be triggered by an authenticated user when generating a new executable. The web application also contains a cross site scripting vulnerability within the view of a returned command being executed on an agent.
f57ebc1eae72783c36ac9e3df7805d9879e3d1ced0b8232ea872b32518252dce
Joomla versions 4.2.8 and below remote unauthenticated information disclosure exploit.
626134242ae4ae7b4c28853f3d05cf44659ed92ca2ceb96b914b80675d522cdc