Результаты поиска

  1. Exploiter

    Exploit Hospital Management System 4.0 - Persistent Cross-Site Scripting

    Hospital Management System 4.0 - Persistent Cross-Site Scripting # Exploit Title: Hospital Management System 4.0 - Persistent Cross-Site Scripting # Google Dork: N/A # Date: 2020-01-02 # Exploit Author: FULLSHADE # Vendor Homepage: https://phpgurukul.com/ # Software Link...
  2. Exploiter

    Exploit BloodX 1.0 - Authentication Bypass

    BloodX 1.0 - Authentication Bypass # Exploit Title: BloodX 1.0 - Authentication Bypass # Author: riamloo # Date: 2019-12-31 # Vendor Homepage: https://github.com/diveshlunker/BloodX # Software Link: https://github.com/diveshlunker/BloodX/archive/master.zip # Version: 1 # CVE: N/A # Tested on...
  3. Exploiter

    Exploit Online Course Registration 2.0 - Remote Code Execution

    Online Course Registration 2.0 - Remote Code Execution # Exploit Title: Online Course Registration 2.0 - Remote Code Execution # Exploit Author: Metin Yunus Kandemir # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/online-course-registration-free-download/ #...
  4. Exploiter

    Exploit nostromo 1.9.6 - Remote Code Execution

    nostromo 1.9.6 - Remote Code Execution # Exploit Title: nostromo 1.9.6 - Remote Code Execution # Date: 2019-12-31 # Exploit Author: Kr0ff # Vendor Homepage: # Software Link: http://www.nazgul.ch/dev/nostromo-1.9.6.tar.gz # Version: 1.9.6 # Tested on: Debian # CVE : CVE-2019-16278...
  5. Exploiter

    Exploit Microsoft Windows .Group File - Code Execution

    Microsoft Windows .Group File - Code Execution # Exploit Title: Microsoft Windows .Group File - Code Execution # Date: 2020-01-01 # Exploit Author: hyp3rlinx # Vendor Homepage: www.microsoft.com # Version: 1.9.6 # Tested on: Windows # CVE : N/A [+] Credits: John Page (aka hyp3rlinx) [+]...
  6. Exploiter

    Exploit MSN Password Recovery 1.30 - Denial of Service (PoC)

    MSN Password Recovery 1.30 - Denial of Service (PoC) # Exploit Title: MSN Password Recovery 1.30 - Denial of Service (PoC) # Date: 2020-01-02 # Vendor Homepage: https://www.top-password.com/ # Software Link: https://www.top-password.com/download/MSNPRSetup.exe # Exploit Author: Gokkulraj #...
  7. Exploiter

    Exploit Hospital Management System 4.0 - 'searchdata' SQL Injection

    Hospital Management System 4.0 - 'searchdata' SQL Injection # Exploit Title: Hospital Management System 4.0 - 'searchdata' SQL Injection # Google Dork: N/A # Date: 2020-01-02 # Exploit Author: FULLSHADE # Vendor Homepage: https://phpgurukul.com/ # Software Link...
  8. Exploiter

    Exploit FreeBSD-SA-19:15.mqueuefs - Privilege Escalation

    FreeBSD-SA-19:15.mqueuefs - Privilege Escalation # Exploit: FreeBSD-SA-19:15.mqueuefs - Privilege Escalation # Author: Karsten König of Secfault Security # Date: 2019-12-30 # Change line 719 to choose which vulnerability # is targeted # # libmap.conf primitive inspired by kcope's 2005 exploit...
  9. Exploiter

    Exploit Shopping Portal ProVersion 3.0 - Authentication Bypass

    Shopping Portal ProVersion 3.0 - Authentication Bypass # Exploit Title: Shopping Portal ProVersion 3.0 - Authentication Bypass # Exploit Author: Metin Yunus Kandemir (kandemir) # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/shopping-portal-free-download/ #...
  10. Exploiter

    Exploit Hospital Management System 4.0 - Authentication Bypass

    Hospital Management System 4.0 - Authentication Bypass # Exploit Title: Hospital Management System 4.0 - Authentication Bypass # Exploit Author: Metin Yunus Kandemir (kandemir) # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/hospital-management-system-in-php/...
  11. Exploiter

    Exploit Microsoft Windows 8.1/2012 R2 - SMBv3 Null Pointer Dereference Denial of Service

    Microsoft Windows 8.1/2012 R2 - SMBv3 Null Pointer Dereference Denial of Service # Exploit Title: Microsoft Windows SMB Client Null Pointer Dereference Denial of Service # Date: 26/02/2018 # Exploit Author: Nabeel Ahmed # Version: SMBv3 # Tested on: Windows 8.1 (x86), Windows Server 2012 R2...
  12. Exploiter

    Exploit HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin)

    HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin) # Exploit: HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin) # Date: 2019-12-30 # Author: LiquidWorm # Vendor: Tom Rosenback and Daniel Malmgren # Product web page: http://karpero.mine.nu/ha/ # Affected version: 3.3.2 #...
  13. Exploiter

    Exploit FreeBSD-SA-19:02.fd - Privilege Escalation

    FreeBSD-SA-19:02.fd - Privilege Escalation # Exploit: FreeBSD-SA-19:02.fd - Privilege Escalation # Date: 2019-12-30 # Author: Karsten König of Secfault Security # Twitter: @gr4yf0x # Kudos: Maik, greg and Dirk for discussion and inspiration # CVE: CVE-2019-5596 # libmap.conf primitive inspired...
  14. Exploiter

    Exploit MyBB My Arcade Plugin 1.3 - Cross-Site Scripting

    MyBB My Arcade Plugin 1.3 - Cross-Site Scripting # Exploit Title: MyBB My Arcade Plugin v1.3 - Persistent XSS # Date: 2/21/2018 # Author: 0xB9 # Contact: luxorforums.com/User-0xB9 or 0xB9[at]protonmail.com # Software Link: https://community.mybb.com/mods.php?action=view&pid=411 # Version: 1.3...
  15. Exploiter

    Exploit OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit)

    OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking include...
  16. Exploiter

    Exploit Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit)

    Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking include...
  17. Exploiter

    Exploit Microsoft UPnP - Local Privilege Elevation (Metasploit)

    Microsoft UPnP - Local Privilege Elevation (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/post/common' require 'msf/core/post/file' require 'msf/core/post/windows/priv'...
  18. Exploiter

    Exploit macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()

    macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event() The XNU function wait_for_namespace_event() in bsd/vfs/vfs_syscalls.c releases a file descriptor for use by userspace but may then subsequently destroy that file descriptor using fp_free(), which...
  19. Exploiter

    Exploit OpenMRS - Java Deserialization RCE (Metasploit)

    OpenMRS - Java Deserialization RCE (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include...
  20. Exploiter

    Exploit Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption

    Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption ''' # SUBSCRIBE message with a large Accept value causes stack corruption - Authors: - Alfred Farrugia <[email protected]> - Sandro Gauci <[email protected]> - Latest vulnerable version: Asterisk 15.2.0...
  21. Exploiter

    Exploit Asterisk chan_pjsip 15.2.0 - 'INVITE' Denial of Service

    Asterisk chan_pjsip 15.2.0 - 'INVITE' Denial of Service ''' # Crash occurs when sending a repeated number of INVITE messages over TCP or TLS transport - Authors: - Alfred Farrugia <[email protected]> - Sandro Gauci <[email protected]> - Latest vulnerable version...
  22. Exploiter

    Exploit Asterisk chan_pjsip 15.2.0 - 'SDP' Denial of Service

    Asterisk chan_pjsip 15.2.0 - 'SDP' Denial of Service ''' # Segmentation fault occurs in Asterisk with an invalid SDP media format description - Authors: - Alfred Farrugia <[email protected]> - Sandro Gauci <[email protected]> - Latest vulnerable version: Asterisk...
  23. Exploiter

    Exploit Asterisk chan_pjsip 15.2.0 - 'SDP fmtp' Denial of Service

    Asterisk chan_pjsip 15.2.0 - 'SDP fmtp' Denial of Service ''' # Segmentation fault occurs in asterisk with an invalid SDP fmtp attribute - Authors: - Alfred Farrugia <[email protected]> - Sandro Gauci <[email protected]> - Latest vulnerable version: Asterisk 15.2.0...
  24. Exploiter

    Exploit Chrome V8 - 'PropertyArray' Integer Overflow

    Chrome V8 - 'PropertyArray' Integer Overflow /* Here's a snippet of the MigrateFastToFast function which is used to create a new PropertyArray object. int number_of_fields = new_map->NumberOfFields(); int inobject = new_map->GetInObjectProperties(); int unused =...
  25. Exploiter

    Exploit OpenBSD 6.x - Dynamic Loader Privilege Escalation

    OpenBSD 6.x - Dynamic Loader Privilege Escalation Qualys Security Advisory Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726) ============================================================================== Contents...