Index of /packetstormsecurity/2112-exploits

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]CVE-2021-44228-PoC-log4j-bypass-words-main.zip2025-04-10 07:04 5.0K 
[   ]L4sh-main.zip2025-04-10 07:04 13K 
[TXT]MICROSOFT-INTERNET-EXPLORER-ACTIVEX-CONTROL-SECURITY-BYPASS.txt2025-04-09 20:09 4.8K 
[TXT]MVID-2021-0412.txt2025-04-10 03:34 2.1K 
[TXT]MVID-2021-0413.txt2025-04-09 23:48 2.1K 
[TXT]MVID-2021-0414.txt2025-04-10 06:49 2.4K 
[TXT]MVID-2021-0415.txt2025-04-09 23:48 2.1K 
[TXT]MVID-2021-0416.txt2025-04-09 23:48 1.9K 
[TXT]MVID-2021-0417.txt2025-04-09 21:45 2.9K 
[TXT]MVID-2021-0418.txt2025-04-09 21:46 1.8K 
[TXT]MVID-2021-0419.txt2025-04-09 21:55 1.6K 
[TXT]MVID-2021-0420.txt2025-04-09 21:36 7.1K 
[TXT]MVID-2021-0421.txt2025-04-10 06:49 1.8K 
[TXT]MVID-2021-0422.txt2025-04-10 06:52 5.8K 
[TXT]MVID-2021-0423.txt2025-04-09 21:37 2.2K 
[TXT]MVID-2021-0424.txt2025-04-09 21:51 2.5K 
[TXT]MVID-2021-0425.txt2025-04-10 06:49 2.3K 
[TXT]MVID-2021-0426.txt2025-04-09 21:55 5.7K 
[TXT]MVID-2021-0427.txt2025-04-09 21:55 1.7K 
[TXT]MVID-2021-0428.txt2025-04-10 06:52 2.1K 
[TXT]MVID-2021-0429.txt2025-04-10 03:42 5.5K 
[TXT]MVID-2021-0430.txt2025-04-10 06:50 2.8K 
[TXT]MVID-2021-0431.txt2025-04-10 03:35 1.5K 
[TXT]MVID-2021-0432.txt2025-04-10 03:39 2.6K 
[TXT]MVID-2021-0433.txt2025-04-10 06:49 5.7K 
[TXT]SA-20211202-0.txt2025-04-09 23:48 21K 
[TXT]SA-20211213-0.txt2025-04-10 03:29 5.6K 
[TXT]SA-20211213-1.txt2025-04-10 00:41 5.0K 
[TXT]SA-20211214-0.txt2025-04-09 20:42 12K 
[TXT]SA-20211214-1.txt2025-04-10 06:49 8.3K 
[TXT]SYSS-2021-061.txt2025-04-10 03:57 8.0K 
[TXT]SYSS-2021-062.txt2025-04-09 21:37 5.4K 
[TXT]TRSA-2109-01.txt2025-04-10 07:04 5.0K 
[TXT]ZSL-2021-5689.txt2025-04-10 00:41 3.5K 
[TXT]ZSL-2021-5690.txt2025-04-10 00:41 4.2K 
[TXT]accutimemaximums10-overflow.txt2025-04-10 06:54 1.3K 
[TXT]alfateam41-exec.txt2025-04-10 06:56 895  
[   ]apache-log4j-poc-main.zip2025-04-10 07:04 3.6K 
[TXT]apachelog4j2-exec.txt2025-04-10 07:04 2.1K 
[TXT]arunna100-xsrf.txt2025-04-10 06:48 2.8K 
[TXT]averevc300-bypasshardcoded.txt2025-04-10 06:45 2.6K 
[TXT]bazaarwebphpsl-shell.txt2025-04-10 00:37 2.3K 
[TXT]bookedscheduler275-shell.txt2025-04-10 06:49 3.0K 
[TXT]cibeletv25410-enumerate.txt2025-04-09 20:54 801  
[TXT]cpms202-exec.txt2025-04-10 06:43 3.1K 
[TXT]cpms202p-exec.txt2025-04-10 03:34 2.6K 
[TXT]croogo302-exec.txt2025-04-10 06:52 2.6K 
[TXT]cve_2021_3493_overlayfs.rb.txt2025-04-10 06:49 6.6K 
[TXT]duckduckgo-spoof.txt2025-04-09 23:48 1.1K 
[TXT]edtms10-sql.txt2025-04-10 03:34 2.0K 
[TXT]edtms10persistent-xss.txt2025-04-10 03:34 4.3K 
[TXT]exponentcms26-xss.txt2025-04-10 00:09 3.0K 
[TXT]fsms10-shell.txt2025-04-10 06:47 3.3K 
[TXT]fsms10-xss.txt2025-04-10 06:50 3.6K 
[TXT]grafana830-traversal.txt2025-04-10 06:57 2.7K 
[TXT]hcllotusnotes12-unquotedpath.txt2025-04-10 00:55 925  
[TXT]hdrtms20-lfi.txt2025-04-10 06:52 885  
[TXT]kasms10-sql.txt2025-04-10 06:57 1.2K 
[TXT]laravelvalet203-escalate.txt2025-04-09 23:23 5.2K 
[TXT]limesurvey524-exec.txt2025-04-10 03:34 4.5K 
[   ]log4j-payload-generator-master.zip2025-04-10 07:04 410K 
[   ]log4j-scan-master.zip2025-04-10 07:04 15K 
[TXT]log4j22141-disclose.txt2025-04-10 07:04 3.1K 
[   ]log4shell_regexes.tgz2025-04-10 07:04 2.0K 
[TXT]manageengine_servicedesk_plus_cve_2021_44077.rb.txt2025-04-10 07:04 4.4K 
[TXT]mfiles-dos.txt2025-04-09 23:48 5.6K 
[TXT]millegpg5572luglio2021-escalate.txt2025-04-10 06:52 5.0K 
[TXT]mtputty10121-disclose.txt2025-04-10 03:34 532  
[TXT]oemspp10-xss.txt2025-04-09 20:55 3.0K 
[TXT]oliverlibraryserver5-disclose.txt2025-04-10 06:56 825  
[TXT]omms10-sql.txt2025-04-10 06:49 1.1K 
[TXT]opucsms10-sql.txt2025-04-09 23:48 1.2K 
[TXT]otas10-sqlxss.txt2025-04-10 06:36 1.5K 
[TXT]phpkfcms300betay6-exec.txt2025-04-09 23:19 7.1K 
[TXT]raspberrypi-default.txt2025-04-10 06:49 686  
[TXT]rlm142-bypass.txt2025-04-10 06:57 1.1K 
[TXT]rlm142-enumerate.txt2025-04-10 06:53 1.2K 
[TXT]rlm142-exec.txt2025-04-10 06:57 1.2K 
[TXT]rlm142-hijack.txt2025-04-10 06:55 1.4K 
[TXT]rlm142-overflow.txt2025-04-10 06:50 876  
[TXT]rt-sa-2021-004.txt2025-04-10 00:55 9.1K 
[TXT]rt-sa-2021-005.txt2025-04-10 03:58 9.8K 
[TXT]rt-sa-2021-006.txt2025-04-10 06:49 9.9K 
[TXT]rt-sa-2021-007.txt2025-04-10 00:55 12K 
[TXT]scsms10-sql.txt2025-04-10 06:49 1.8K 
[TXT]sfds10-sql.txt2025-04-09 21:36 2.4K 
[TXT]signupphpportal21-shell.txt2025-04-10 03:37 2.0K 
[TXT]somsms10-sql.txt2025-04-10 00:55 1.1K 
[TXT]terramaster-exec.py.txt2025-04-10 00:44 4.1K 
[TXT]testlink119-filedownload.txt2025-04-10 03:34 720  
[TXT]ticketbooking10-sql.txt2025-04-10 06:49 2.4K 
[TXT]vsw10-sql.txt2025-04-10 06:51 1.4K 
[TXT]wbcecms151-password.txt2025-04-10 06:48 1.3K 
[TXT]webhmi40-exec.txt2025-04-09 21:36 3.4K 
[TXT]wepp-open.txt2025-04-09 22:35 297K 
[TXT]wepp-spoof.txt2025-04-10 06:57 1.0K 
[TXT]word_mshtml_rce.rb.txt2025-04-10 06:48 12K 
[TXT]wp_popular_posts_rce.rb.txt2025-04-10 04:14 18K 
[TXT]wpallinonevg249-lfi.txt2025-04-09 23:48 589  
[TXT]wpctdi161-shell.txt2025-04-10 06:44 8.2K 
[TXT]wpdzszoomsounds645-fileread.txt2025-04-10 06:58 4.0K 
[TXT]wpsbs262-xss.txt2025-04-09 22:44 920  
[TXT]wptypebot143-xss.txt2025-04-10 00:41 860  

Apache/2.4.63 (Debian) Server at gbppr.ddns.net Port 80