Index of /2112-exploits

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2021-exploits.tgz2022-01-01 19:56 58M 
[   ]202112-exploits.tgz2022-01-01 19:39 4.5M 
[   ]Polkit-CVE-2021-3560.pdf2021-12-10 14:46 2.0M 
[   ]CVE-2019-5736-PoC-master.zip2021-12-08 10:11 1.6M 
[   ]log4j-payload-generator-master.zip2021-12-15 14:42 410K 
[TXT]wepp-open.txt2021-12-28 17:05 297K 
[   ]GS20211217140838.tgz2021-12-17 14:09 204K 
[   ]ets5-password-recovery-main.zip2021-12-08 15:58 75K 
[TXT]SA-20211202-0.txt2021-12-03 17:18 21K 
[TXT]wp_popular_posts_rce.rb.txt2021-12-20 16:28 18K 
[   ]log4j-scan-master.zip2021-12-15 16:15 15K 
[   ]stegcrack-main.zip2021-12-08 15:53 14K 
[   ]L4sh-main.zip2021-12-15 15:55 13K 
[TXT]rt-sa-2021-007.txt2021-12-06 16:31 12K 
[TXT]SA-20211214-0.txt2021-12-15 15:39 12K 
[TXT]word_mshtml_rce.rb.txt2021-12-09 15:01 12K 
[   ]GS20211202160033.tgz2021-12-02 16:00 11K 
[TXT]rt-sa-2021-006.txt2021-12-06 16:28 9.9K 
[TXT]rt-sa-2021-005.txt2021-12-06 16:23 9.8K 
[   ]GS20211216152619.tgz2021-12-16 15:26 9.4K 
[TXT]rt-sa-2021-004.txt2021-12-06 16:21 9.1K 
[TXT]SA-20211214-1.txt2021-12-15 15:42 8.3K 
[TXT]wpctdi161-shell.txt2021-12-09 14:48 8.2K 
[TXT]SYSS-2021-061.txt2021-12-13 15:10 8.0K 
[TXT]SA-20211214-2.txt2021-12-15 15:44 7.5K 
[TXT]phpkfcms300betay6-exec.txt2021-12-21 14:04 7.1K 
[TXT]MVID-2021-0420.txt2021-12-13 14:59 7.1K 
[   ]GS20211216152827.tgz2021-12-16 15:28 6.7K 
[TXT]cve_2021_3493_overlayfs.rb.txt2021-12-03 17:03 6.6K 
[TXT]croogo302-xss.txt2021-12-16 15:18 5.9K 
[TXT]MVID-2021-0422.txt2021-12-13 15:01 5.8K 
[TXT]MVID-2021-0433.txt2021-12-28 17:09 5.7K 
[TXT]MVID-2021-0426.txt2021-12-13 15:06 5.7K 
[TXT]mfiles-dos.txt2021-12-03 16:46 5.6K 
[TXT]SA-20211213-0.txt2021-12-14 15:35 5.6K 
[TXT]MVID-2021-0429.txt2021-12-17 14:07 5.5K 
[TXT]SYSS-2021-062.txt2021-12-13 15:18 5.4K 
[TXT]laravelvalet203-escalate.txt2021-12-14 15:56 5.2K 
[   ]CVE-2021-44228-PoC-log4j-bypass-words-main.zip2021-12-15 16:01 5.0K 
[TXT]millegpg5572luglio2021-escalate.txt2021-12-01 16:36 5.0K 
[TXT]TRSA-2109-01.txt2021-12-15 15:31 5.0K 
[TXT]SA-20211213-1.txt2021-12-14 15:57 5.0K 
[   ]Grafana-CVE-2021-43798-main.zip2021-12-08 15:48 4.8K 
[TXT]MICROSOFT-INTERNET-EXPLORER-ACTIVEX-CONTROL-SECURITY-BYPASS.txt2021-12-06 16:12 4.8K 
[TXT]limesurvey524-exec.txt2021-12-09 14:59 4.5K 
[   ]GS20211201163339.tgz2021-12-01 16:33 4.5K 
[TXT]manageengine_servicedesk_plus_cve_2021_44077.rb.txt2021-12-28 17:21 4.4K 
[TXT]opencats094-exec.txt2021-12-10 14:54 4.3K 
[TXT]edtms10persistent-xss.txt2021-12-09 14:26 4.3K 
[   ]GS20211206162620.tgz2021-12-06 16:26 4.3K 
[TXT]ZSL-2021-5690.txt2021-12-14 15:46 4.2K 
[TXT]terramaster-exec.py.txt2021-12-28 17:18 4.1K 
[TXT]wpdzszoomsounds645-fileread.txt2021-12-03 16:51 4.0K 
[   ]apache-log4j-poc-main.zip2021-12-10 13:58 3.6K 
[   ]GS20211216153046.tgz2021-12-16 15:33 3.6K 
[TXT]fsms10-xss.txt2021-12-10 14:53 3.6K 
[TXT]ZSL-2021-5689.txt2021-12-14 15:37 3.5K 
[TXT]webhmi40-exec.txt2021-12-13 15:07 3.4K 
[TXT]fsms10-shell.txt2021-12-10 14:52 3.3K 
[TXT]log4j22141-disclose.txt2021-12-14 15:30 3.1K 
[TXT]cpms202-exec.txt2021-12-09 14:29 3.1K 
[TXT]bookedscheduler275-shell.txt2021-12-14 15:33 3.0K 
[TXT]exponentcms26-xss.txt2021-12-21 14:06 3.0K 
[TXT]oemspp10-xss.txt2021-12-01 16:30 3.0K 
[TXT]MVID-2021-0417.txt2021-12-13 14:57 2.9K 
[TXT]MVID-2021-0430.txt2021-12-17 14:07 2.8K 
[TXT]arunna100-xsrf.txt2021-12-16 15:07 2.8K 
[TXT]grafana830-traversal.txt2021-12-09 15:22 2.7K 
[TXT]croogo302-exec.txt2021-12-06 16:16 2.6K 
[TXT]MVID-2021-0432.txt2021-12-28 17:08 2.6K 
[TXT]averevc300-bypasshardcoded.txt2021-12-21 14:11 2.6K 
[TXT]cpms202p-exec.txt2021-12-09 14:31 2.6K 
[TXT]MVID-2021-0424.txt2021-12-13 15:04 2.5K 
[TXT]croogo302-shell.txt2021-12-16 15:20 2.4K 
[TXT]ticketbooking10-sql.txt2021-12-14 15:40 2.4K 
[TXT]sfds10-sql.txt2021-12-13 15:03 2.4K 
[TXT]MVID-2021-0414.txt2021-12-03 16:49 2.4K 
[TXT]bazaarwebphpsl-shell.txt2021-12-20 16:18 2.3K 
[TXT]MVID-2021-0425.txt2021-12-13 15:04 2.3K 
[TXT]MVID-2021-0423.txt2021-12-13 15:01 2.2K 
[TXT]MVID-2021-0428.txt2021-12-13 15:15 2.1K 
[TXT]MVID-2021-0412.txt2021-12-03 16:43 2.1K 
[TXT]apachelog4j2-exec.txt2021-12-14 15:41 2.1K 
[TXT]MVID-2021-0415.txt2021-12-03 16:53 2.1K 
[TXT]MVID-2021-0413.txt2021-12-03 16:48 2.1K 
[TXT]acs10-exec.txt2021-12-01 16:32 2.0K 
[   ]log4shell_regexes.tgz2021-12-15 14:37 2.0K 
[TXT]edtms10-sql.txt2021-12-09 14:28 2.0K 
[TXT]signupphpportal21-shell.txt2021-12-20 13:58 2.0K 
[TXT]MVID-2021-0416.txt2021-12-03 17:08 1.9K 
[TXT]cdcms10-sql.txt2021-12-16 15:01 1.9K 
[TXT]scsms10-sql.txt2021-12-15 15:01 1.8K 
[TXT]MVID-2021-0418.txt2021-12-13 14:57 1.8K 
[TXT]MVID-2021-0421.txt2021-12-13 15:01 1.8K 
[TXT]MVID-2021-0427.txt2021-12-13 15:09 1.7K 
[TXT]MVID-2021-0419.txt2021-12-13 14:58 1.6K 
[TXT]MVID-2021-0431.txt2021-12-28 17:06 1.5K 
[TXT]otas10-sqlxss.txt2021-12-14 15:44 1.5K 
[TXT]rlm142-hijack.txt2021-12-08 15:23 1.4K 
[TXT]vsw10-sql.txt2021-12-20 14:00 1.4K 
[TXT]accutimemaximums10-overflow.txt2021-12-23 14:29 1.3K 
[TXT]wbcecms151-password.txt2021-12-21 13:49 1.3K 
[TXT]kasms10-sql.txt2021-12-09 13:33 1.2K 
[TXT]rlm142-enumerate.txt2021-12-08 15:10 1.2K 
[TXT]opucsms10-sql.txt2021-12-03 16:43 1.2K 
[TXT]rlm142-exec.txt2021-12-08 15:28 1.2K 
[TXT]somsms10-sql.txt2021-12-06 16:07 1.1K 
[TXT]omms10-sql.txt2021-12-03 16:49 1.1K 
[TXT]rlm142-bypass.txt2021-12-08 15:14 1.1K 
[TXT]duckduckgo-spoof.txt2021-12-03 16:42 1.1K 
[TXT]wepp-spoof.txt2021-12-28 17:09 1.0K 
[TXT]hcllotusnotes12-unquotedpath.txt2021-12-06 16:11 925  
[TXT]wpsbs262-xss.txt2021-12-03 16:56 920  
[TXT]alfateam41-exec.txt2021-12-20 13:53 895  
[TXT]hdrtms20-lfi.txt2021-12-13 14:59 885  
[TXT]rlm142-overflow.txt2021-12-08 15:27 876  
[TXT]wptypebot143-xss.txt2021-12-14 15:54 860  
[TXT]oliverlibraryserver5-disclose.txt2021-12-15 14:56 825  
[TXT]cibeletv25410-enumerate.txt2021-12-16 15:24 801  
[TXT]testlink119-filedownload.txt2021-12-09 14:55 720  
[TXT]raspberrypi-default.txt2021-12-09 10:11 686  
[TXT]wpallinonevg249-lfi.txt2021-12-03 17:07 589  
[TXT]mtputty10121-disclose.txt2021-12-09 14:46 532  

Apache/2.4.52 (Ubuntu) Server at www2.packetstormsecurity.org Port 80