Discord Probot Arbitrary File Upload ≈ Packet Storm
February 10th, 2021 📆 | 5912 Views ⚑
# Exploit Title: Discord Probot – Unrestricted File Upload # Google Dork: N/A# Date: 2021-02-08# Exploit Author: ThelastVvV# Vendor Homepage:probot.io#
February 10th, 2021 📆 | 5912 Views ⚑
# Exploit Title: Discord Probot – Unrestricted File Upload # Google Dork: N/A# Date: 2021-02-08# Exploit Author: ThelastVvV# Vendor Homepage:probot.io#
February 4th, 2021 📆 | 5003 Views ⚑
# Exploit Title: Car Rental Project 2.0 - Arbitrary File Upload to Remote Code Execution # Date: 3/2/2021 # Exploit
January 30th, 2021 📆 | 8611 Views ⚑
# Exploit Title: WordPress Plugin SuperForms 4.9 - Arbitrary File Upload to Remote Code Execution # Exploit Author: ABDO10 #
January 26th, 2021 📆 | 3812 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘rex/tar’ class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::FILEFORMAT def
January 13th, 2021 📆 | 6439 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Localinclude Exploit::EXEinclude Msf::Post::Fileinclude Msf::Post::Windows::Privinclude Msf::Post::Windows::Processinclude Msf::Post::Windows::ReflectiveDLLInjectioninclude Msf::Post::Windows::Dotnetinclude Msf::Post::Windows::Servicesinclude
January 9th, 2021 📆 | 2866 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Auxiliaryinclude Msf::Exploit::Remote::HttpClientinclude Msf::Auxiliary::Scannerinclude Msf::Auxiliary::Report def initialize(info = {})super(update_info(info,‘Name’
January 9th, 2021 📆 | 2631 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include
January 8th, 2021 📆 | 1576 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include
January 8th, 2021 📆 | 7139 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner
December 24th, 2020 📆 | 6840 Views ⚑
# Exploit Title: WordPress Plugin Adning Advertising 1.5.5 - Arbitrary File Upload # Google Dork: inurl:/wp-content/plugins/angwp # Date: 23/12/2020 #
December 22nd, 2020 📆 | 5995 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include
December 19th, 2020 📆 | 6450 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HTTP::Wordpress
December 10th, 2020 📆 | 3420 Views ⚑
The Microsoft Windows Cloud Filter driver can be abused to create arbitrary files and directories leading to elevation of privilege.
December 6th, 2020 📆 | 4378 Views ⚑
# Exploit Title: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile # Date: November 17th, 2020
December 6th, 2020 📆 | 7488 Views ⚑
# Exploit Title: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) # Date: November 17th, 2020 # Exploit Author:
December 1st, 2020 📆 | 2770 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-27 #
November 29th, 2020 📆 | 5427 Views ⚑
# Exploit Title: Foxit Reader 9.0.1.1049 – Arbitrary Code Execution# Date: August 29, 2020# Exploit Author: CrossWire# Vendor Homepage: https://www.foxitsoftware.com/#
November 27th, 2020 📆 | 3039 Views ⚑
# Exploit Title: Foxit Reader 9.0.1.1049 - Arbitrary Code Execution # Date: August 29, 2020 # Exploit Author: CrossWire #
November 20th, 2020 📆 | 3154 Views ⚑
*] *]# Exploit Title: Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection # Date: 13/09/2020 # Exploit Author: Gabriele Zuddas
November 20th, 2020 📆 | 4107 Views ⚑
# Exploit Title: Gitlab 12.9.0 – Arbitrary File Read (Authenticated)# Google Dork: –# Date: 11/15/2020# Exploit Author: Jasper Rasenberg# Vendor
Comments