Результаты поиска

  1. Exploiter

    Exploit WordPress Plugin W3 Total Cache - Unauthenticated Arbitrary File Read (Metasploit)

    WordPress Plugin W3 Total Cache - Unauthenticated Arbitrary File Read (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # ## class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report...
  2. Exploiter

    Exploit Microsoft Edge Chakra - Cross Context Use-After-Free

    Microsoft Edge Chakra - Cross Context Use-After-Free <!-- 1. Background The CrossSite class is used for passing JavaScript variables across different contexts. Chakra is basically trying to wrap every variable being passed from a context to another context. The way it wraps an object is, first...
  3. Exploiter

    Exploit Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write

    Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write <!-- Skia bug report: https://bugs.chromium.org/p/skia/issues/detail?id=7674 Mozilla bug report: https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 In Skia, SkTDArray stores length (fCount) and capacity...
  4. Exploiter

    Exploit D-Link DSL-2750B - OS Command Injection (Metasploit)

    D-Link DSL-2750B - OS Command Injection (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking include...
  5. Exploiter

    Exploit Samsung Galaxy S7 Edge - Overflow in OMACP WbXml String Extension Processing

    Samsung Galaxy S7 Edge - Overflow in OMACP WbXml String Extension Processing OMACP is a protocol supported by many mobile devices which allows them to receive provisioning information over the mobile network. One way to provision a device is via a WAP push SMS message containing provisioning...
  6. Exploiter

    Exploit Online Matrimonial Project 1.0 - Authenticated Remote Code Execution

    Online Matrimonial Project 1.0 - Authenticated Remote Code Execution # Exploit Title: Online Matrimonial Project 1.0 - Authenticated Remote Code Execution # Exploit Author: Valerio Alessandroni # Date: 2020-10-07 # Vendor Homepage: https://projectworlds.in/ # Software Link...
  7. Exploiter

    Exploit Oracle WebCenter Sites 11.1.1.8.0/12.2.1.x - Cross-Site Scripting

    Oracle WebCenter Sites 11.1.1.8.0/12.2.1.x - Cross-Site Scripting # Exploit Title: Multiple XSS Oracle WebCenter Sites (FatWire Content Server) 7.x < 11gR1 # Dork: inurl:Satellite?c # Date: 18.12.201 # Exploit Author: Richard Alviarez # Vendor Homepage: http://oracle.com # Version: 7.x < 11gR1...
  8. Exploiter

    Exploit docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)

    docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter) # Exploit Title: docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter) # Date: 2020-07-26 # Exploit Author: MasterVlad # Vendor Homepage: http://www.verypdf.com # Software Link: http://dl.verypdf.net/docprint_pro_setup.exe #...
  9. Exploiter

    Exploit SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow

    SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow # Exploit Title: SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow # Date: 18-Sep-2020 # Exploit Author: Abdessalam king(A.salam) # Vendor Homepage: http://www.syncbreeze.com # Software Link...
  10. Exploiter

    Exploit Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution

    Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution Exploit Title: Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution Date: 2020-08-13 Exploit Author: Loke Hui Yi Vendor Homepage: https://razerid.razer.com Software Link...
  11. Exploiter

    Exploit Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)

    Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH) # Exploit Title: Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH) # Discovery by: Luis Martinez # Discovery Date: 2020-11-22 # Vendor Homepage: http://www.boxoft.com/ # Software Link...
  12. Exploiter

    Exploit ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection (Metasploit)

    ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking...
  13. Exploiter

    Exploit WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting

    WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting # Exploit Title: WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting # Date: 20-11-2020 # Exploit Author: Hemant Patidar (HemantSolo) # Vendor Homepage: https://www.wondercms.com/ # Version: 3.1.3 # Tested on: Windows 10/Kali...
  14. Exploiter

    Exploit Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)

    Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include...
  15. Exploiter

    Exploit Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit

    Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit # Exploit Title: Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit # Date: 17.09.2020 # Vendor Homepage: http://www.boxoft.com/ # Software Link: http://www.boxoft.com/convert-master/setup(boxoft-conver=t-master).exe # Exploit Author...
  16. Exploiter

    Exploit AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass

    AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass /* ======== Intro / Overview ======== After Michael Schwarz made some interesting observations, we started looking into variants other than the three already-known ones. I noticed that Intel's Optimization Manual...
  17. Exploiter

    Exploit Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)

    Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = GoodRanking...
  18. Exploiter

    Exploit Microsoft Windows - 'POP/MOV SS' Privilege Escalation

    Microsoft Windows - 'POP/MOV SS' Privilege Escalation Demo exploitation of the POP SS vulnerability (CVE-2018-8897), leading to unsigned code execution with kernel privilages. - KVA Shadowing should be disabled and the relevant security update should be uninstalled. - This may not work with...
  19. Exploiter

    Exploit Linux 2.6.30 < 2.6.36-rc8 - Reliable Datagram Sockets (RDS) Privilege Escalation (Metasploit)

    Linux 2.6.30 < 2.6.36-rc8 - Reliable Datagram Sockets (RDS) Privilege Escalation (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank =...
  20. Exploiter

    Exploit Bludit 3.9.2 - Authentication Bruteforce Bypass (Metasploit)

    Bludit 3.9.2 - Authentication Bruteforce Bypass (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient...