Результаты поиска

  1. Exploiter

    Exploit Samsung Devices KNOX Extensions - OTP Service Heap Overflow

    Samsung Devices KNOX Extensions - OTP Service Heap Overflow /** Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=935 As a part of the KNOX extensions available on Samsung devices, Samsung provides a new service which allows the generation of OTP tokens. The tokens themselves...
  2. Exploiter

    Exploit Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow

    Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow /** Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=938 As a part of the KNOX extensions available on Samsung devices, Samsung provides a TrustZone trustlet which allows the generation of OTP...
  3. Exploiter

    Exploit Serva 3.0.0 - HTTP Server Denial of Service

    Serva 3.0.0 - HTTP Server Denial of Service #!/usr/bin/env python # # # Serva 3.0.0 HTTP Server Module Remote Denial of Service Exploit # # # Vendor: Patrick Masotta # Product web page: http://www.vercot.com # Affected version: 3.0.0.1001 (Community, Pro, 32/64bit) # # Summary: Serva is a...
  4. Exploiter

    Exploit iOS 10.1.x - Certificate File Memory Corruption

    iOS 10.1.x - Certificate File Memory Corruption Source: https://cxsecurity.com/issue/WLB-2016110046 iOS 10.1.x Remote memory corruption through certificate file Credit: Maksymilian Arciemowicz from https://cxsecurity.com...
  5. Exploiter

    Exploit Microsoft Internet Explorer 9 - IEFRAME CSelectionInteractButtonBehavior::_UpdateButtonLocation Use-After-Free (MS13-047)

    Microsoft Internet Explorer 9 - IEFRAME CSelectionInteractButtonBehavior::_UpdateButtonLocation Use-After-Free (MS13-047) <!-- Source: http://blog.skylined.nl/20161212001.html Synopsis A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9. I...
  6. Exploiter

    Exploit EasyPHP Devserver 16.1.1 - Insecure File Permissions Privilege Escalation

    EasyPHP Devserver 16.1.1 - Insecure File Permissions Privilege Escalation Title: EasyPHP Devserver Insecure File Permissions Privilege Escalation Application: EasyPHP Devserver Versions Affected: 16.1 Vendor URL: http://www.easyphp.org/ Discovered by: Ashiyane Digital Security Team ~ Micle...
  7. Exploiter

    Exploit 10-Strike Network File Search Pro 2.3 - Local Buffer Overflow (SEH)

    10-Strike Network File Search Pro 2.3 - Local Buffer Overflow (SEH) #!python ##################################################################################### # Exploit title: 10-Strike Network File Search Pro 2.3 Registration code SEH exploit # Date: 2016-12-10 # Vendor homepage...
  8. Exploiter

    Exploit PHP 5.2.3 imap (Debian Based) - 'imap_open' disable_functions Bypass

    PHP 5.2.3 imap (Debian Based) - 'imap_open' disable_functions Bypass <?php # https://antichat.com/threads/463395/#post-4254681 # echo '1234567890'>/tmp/test0001 $server = "x -oProxyCommand=echo\tZWNobyAnMTIzNDU2Nzg5MCc+L3RtcC90ZXN0MDAwMQo=|base64\t-d|sh}"...
  9. Exploiter

    Exploit Splunk Enterprise 6.4.3 - Server-Side Request Forgery

    Splunk Enterprise 6.4.3 - Server-Side Request Forgery ''' ( , ) (, . '.' ) ('. ', ). , ('. ( ) ( (_,) .'), ) _ _, / _____/ / _ \ ____ ____ _____ \____ \==/ /_\ \ _/ ___\/ _ \ / \ / \/ | \\ \__( <_> ) Y Y \ /______ /\___|__ / \___...
  10. Exploiter

    Exploit Pozzo & Lucky, The phantom Shell. Stego in TCP/IP (part-2)

    Pozzo & Lucky, The phantom Shell. Stego in TCP/IP (part-2) 40897.pdf
  11. Exploiter

    Exploit Art of Anti Detection - Introduction To AV & Detection Techniques

    Art of Anti Detection - Introduction To AV & Detection Techniques 40900.pdf
  12. Exploiter

    Exploit Roundcube 1.2.2 - Remote Code Execution

    Roundcube 1.2.2 - Remote Code Execution Roundcube 1.2.2: Command Execution via Email ============================================ You can find the online version of the advisory here: https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ Found by Robin Peraglie with RIPS...
  13. Exploiter

    Exploit Microsoft Internet Explorer 9 - MSHTML CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (1)

    Microsoft Internet Explorer 9 - MSHTML CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (1) <!-- Source: http://blog.skylined.nl/20161207001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. I did not investigate...
  14. Exploiter

    Exploit Microsoft Internet Explorer 9 - MSHTML CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (2)

    Microsoft Internet Explorer 9 - MSHTML CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (2) <!-- Source: http://blog.skylined.nl/20161208001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. I did not investigate...
  15. Exploiter

    Exploit Dell OpenManage Network Manager 6.2.0.51 SP3 - Multiple Vulnerabilities

    Dell OpenManage Network Manager 6.2.0.51 SP3 - Multiple Vulnerabilities ''' KL-001-2018-009 : Dell OpenManage Network Manager Multiple Vulnerabilities Title: Dell OpenManage Network Manager Multiple Vulnerabilities Advisory ID: KL-001-2018-009 Publication Date: 2018.11.05 Publication URL...
  16. Exploiter

    Exploit Netgear R7000 - Command Injection

    Netgear R7000 - Command Injection # Exploit Title: Netgear R7000 - Command Injection # Date: 6-12-2016 # Exploit Author: Acew0rm # Contact: https://twitter.com/Acew0rm1 # Vendor Homepage: https://www.netgear.com/ # Category: Hardware # Version: V1.0.7.2_1.1.93 -Vulnerability An...
  17. Exploiter

    Exploit Teaching an Old Dog (not that new) Tricks. Stego in TCP/IP made easy (part-1)

    Teaching an Old Dog (not that new) Tricks. Stego in TCP/IP made easy (part-1) 40891.pdf
  18. Exploiter

    Exploit Edge SkateShop - Authentication bypass

    Edge SkateShop - Authentication bypass # Exploit Title: Edge SkateShop Authentication Bypass # Date: 6/12/2016 # Exploit Author: Delilah # Vendor HomePage: http://www.sourcecodester.com/php/10964/basic-shopping-cartphpmysql.html # Software Link...
  19. Exploiter

    Exploit Dual DHCP DNS Server 7.29 - Denial of Service

    Dual DHCP DNS Server 7.29 - Denial of Service # Title : Dual DHCP DNS Server 7.29 Buffer Overflow (Dos) # Date : 07/12/2016 # Author : R-73eN # Tested on: Dual DHCP DNS Server 7.29 on Windows 7 SP1 (32bit) # Vendor : http://dhcp-dns-server.sourceforge.net/ # Software ...
  20. Exploiter

    Exploit Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit)

    Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include...
  21. Exploiter

    Exploit Microsoft Edge - CMarkup::EnsureDeleteCFState Use-After-Free (MS15-125)

    Microsoft Edge - CMarkup::EnsureDeleteCFState Use-After-Free (MS15-125) Source: http://blog.skylined.nl/20161201001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge. I did not investigate this vulnerability thoroughly, so I cannot...
  22. Exploiter

    Exploit Microsoft Internet Explorer 9 - CDoc::ExecuteScriptUri Use-After-Free (MS13-009)

    Microsoft Internet Explorer 9 - CDoc::ExecuteScriptUri Use-After-Free (MS13-009) <!-- Source: http://blog.skylined.nl/20161202001.html Synopsis A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9. I did not investigate this vulnerability...
  23. Exploiter

    Exploit Microsoft Internet Explorer 9 - 'jscript9' JavaScriptStackWalker Memory Corruption (MS15-056)

    Microsoft Internet Explorer 9 - 'jscript9' JavaScriptStackWalker Memory Corruption (MS15-056) <!-- Source: http://blog.skylined.nl/20161206001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. A pointer set up to point...
  24. Exploiter

    Exploit Linux Kernel 4.4.0 (Ubuntu 14.04/16.04 x86-64) - 'AF_PACKET' Race Condition Privilege Escalation

    Linux Kernel 4.4.0 (Ubuntu 14.04/16.04 x86-64) - 'AF_PACKET' Race Condition Privilege Escalation /* chocobo_root.c linux AF_PACKET race condition exploit exploit for Ubuntu 16.04 x86_64 vroom vroom *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*= user@ubuntu:~$ uname -a Linux...
  25. Exploiter

    Exploit Google Android - Inter-Process munmap with User-Controlled Size in android.graphics.Bitmap

    Google Android - Inter-Process munmap with User-Controlled Size in android.graphics.Bitmap Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=928 Bitmap objects can be passed between processes by flattening them to a Parcel in one process and un-flattening them in another. In...