Результаты поиска

  1. Exploiter

    Exploit Microsoft Windows - DeviceApi CMApi PiCMOpenDeviceKey Arbitrary Registry Key Write Privilege Escalation (MS16-124)

    Microsoft Windows - DeviceApi CMApi PiCMOpenDeviceKey Arbitrary Registry Key Write Privilege Escalation (MS16-124) /* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=872 Windows: DeviceApi CMApi PiCMOpenClassKey Arbitrary Registry Key Write EoP Platform: Windows 10 10586 not...
  2. Exploiter

    Exploit Microsoft Windows - DeviceApi CMApi User Hive Impersonation Privilege Escalation (MS16-124)

    Microsoft Windows - DeviceApi CMApi User Hive Impersonation Privilege Escalation (MS16-124) /* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=875 Windows: DeviceApi CMApi User Hive Impersonation EoP Platform: Windows 10 10586 not tested 8.1 Update 2 or Windows 7 Class...
  3. Exploiter

    Exploit [Turkish] Detailed Cross-Site Scripting Paper

    [Turkish] Detailed Cross-Site Scripting Paper 40568.pdf
  4. Exploiter

    Exploit Imperva SecureSphere 13 - Remote Command Execution

    Imperva SecureSphere 13 - Remote Command Execution # Title: Imperva SecureSphere 13 - Remote Command Execution # Author: rsp3ar # Date: 2018-10-08 # Vendor: https://www.imperva.com/products/securesphere/ # CVE: N/A # Version: 13.0.10, 13.1.10, 13.2.10 # Tested on: SecureSphere (Virtual...
  5. Exploiter

    Exploit The Unarchiver 3.11.1 - '.tar.Z' Crash (PoC)

    The Unarchiver 3.11.1 - '.tar.Z' Crash (PoC) # Exploit Title: The Unarchiver 3.11.1 '.tar.Z' Local Crash PoC # Date: 10-17-2016 # Exploit Author: Antonio Z. # Vendor Homepage: http://unarchiver.c3.cx/unarchiver # Software Link: http://unarchiver.c3.cx/downloads/TheUnarchiver3.11.1.zip #...
  6. Exploiter

    Exploit Cgiemail 1.6 - Source Code Disclosure

    Cgiemail 1.6 - Source Code Disclosure #!/usr/bin/env perl # Exploit Title: cgiemail local file inclusion # Vendor Homepage: http://web.mit.edu/wwwdev/cgiemail/webmaster.html # Software Link: http://web.mit.edu/wwwdev/cgiemail/cgiemail-1.6.tar.gz # Version: 1.6 and older # Date...
  7. Exploiter

    Exploit LanSpy 2.0.0.155 - Local Buffer Overflow

    LanSpy 2.0.0.155 - Local Buffer Overflow #!/usr/bin/python ### LanSpy 2.0.0.155 - Buffer Overflow Exploit by n30m1nd ### # Date: 2016-10-18 # Exploit Author: n30m1nd # Vendor Homepage: www.lantricks.com # Software Link...
  8. Exploiter

    Exploit Linux/x86 - execve(/bin/sh) + MMX/ROT13/XOR Shellcode (Encoder/Decoder) (104 bytes)

    Linux/x86 - execve(/bin/sh) + MMX/ROT13/XOR Shellcode (Encoder/Decoder) (104 bytes) # Title: Linux/x86 - execve(/bin/sh) + MMX/ROT13/XOR Shellcode (Encoder/Decoder) (104 bytes) # Author: Kartik Durg # Date: 201-10-04 # Shellcode Length: 104 BYTES # Student-ID: SLAE-1233 # Write-up Link...
  9. Exploiter

    Exploit Chamilo LMS 1.11.8 - Cross-Site Scripting

    Chamilo LMS 1.11.8 - Cross-Site Scripting # Exploit Title: Chamilo LMS 1.11.8 - Cross-Site Scripting # Author: Cakes # Discovery Date: 2018-10-05 # Vendor Homepage: https://chamilo.org # Software Link: https://github.com/chamilo/chamilo-lms/releases/download/v1.11.8/chamilo-1.11.8-php5.zip #...
  10. Exploiter

    Exploit Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046)

    Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) /* ################################################################ # Exploit Title: Windows x86 (all versions) AFD privilege escalation (MS11-046) # Date: 2016-10-16 # Exploit Author: Tomislav Paskalev # Vulnerable...
  11. Exploiter

    Exploit Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting

    Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting # Exploit Title: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting # Author: Cakes # Discovery Date: 2018-10-06 # Vendor Homepage: https://chamilo.org # Software Link...
  12. Exploiter

    Exploit Ruby on Rails - Dynamic Render File Upload / Remote Code Execution (Metasploit)

    Ruby on Rails - Dynamic Render File Upload / Remote Code Execution (Metasploit) require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer include Msf::Exploit::EXE...
  13. Exploiter

    Exploit Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin)

    Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin) # Exploit Title: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin) # Author: Cakes # Discovery Date: 2018-10-01 # Vendor Homepage: http://www.netis-systems.com # Software Link...
  14. Exploiter

    Exploit Microsoft Windows Diagnostics Hub - DLL Load Privilege Escalation (MS16-125)

    Microsoft Windows Diagnostics Hub - DLL Load Privilege Escalation (MS16-125) /* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=887 Windows: Diagnostics Hub DLL Load EoP Platform: Windows 10 10586, not tested 8.1 Update 2 or Windows 7 Class: Elevation of Privilege Summary...
  15. Exploiter

    Exploit D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities

    D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ D-Link Central WiFiManager Software Controller Multiple Vulnerabilities 1. *Advisory Information* Title: D-Link Central WiFiManager Software...
  16. Exploiter

    Exploit FTP Voyager 16.2.0 - Denial of Service (PoC)

    FTP Voyager 16.2.0 - Denial of Service (PoC) # Exploit Title: FTP Voyager 16.2.0 - Denial of Service (PoC) # Author: Abdullah Alıç # Discovey Date: 2018-10-2 # Vendor notified : 2018-10-2 # Homepage: https://www.serv-u.com/ # Software Link: https://www.serv-u.com/ftp-voyager # Tested Version...
  17. Exploiter

    Exploit Tuleap 8.18 - SQL Injection & Cross-Site Scripting Vulnerability Analysis

    Tuleap 8.18 - SQL Injection & Cross-Site Scripting Vulnerability Analysis 40556.pdf
  18. Exploiter

    Exploit Linux/x86 - execve(/bin/sh) + NOT/SHIFT-N/XOR-N Encoded Shellcode (50 byes)

    Linux/x86 - execve(/bin/sh) + NOT/SHIFT-N/XOR-N Encoded Shellcode (50 byes) /* # Title: Linux\x86 (NOT +SHIFT-N+ XOR-N) + encoded (/bin/sh) Shellcode (50 byes) # Author: Pedro Cabral # Purpose: spawn /bin/sh shell # Tested On: Ubuntu 16.04.01 LTS # Arch: x86 # Size: 50 bytes...
  19. Exploiter

    Exploit [Turkish] Web Security Vulnerabilities - Web Güvenlik Açıkları

    [Turkish] Web Security Vulnerabilities - Web Güvenlik Açıkları 40548.pdf
  20. Exploiter

    Exploit PHP Telephone Directory - Multiple Vulnerabilities

    PHP Telephone Directory - Multiple Vulnerabilities # Exploit Title: PHP Telephone Directory - Multiple Vulnerabilities # Date: 2016-10-16 # Exploit Author: larrycompress # Contact: [email protected] # Type: webapps # Platform: PHP # Vendor Homepage...
  21. Exploiter

    Exploit Subrion CMS 4.0.5 - Cross-Site Request Forgery Bypass / Persistent Cross-Site Scripting

    Subrion CMS 4.0.5 - Cross-Site Request Forgery Bypass / Persistent Cross-Site Scripting # Exploit Title: Subrion CMS 4.0.5 - CSRF Bypass to Persistent XSS and Add-Admin # Date: 15-10-2016 # Software Link: http://www.subrion.org/download/ # Vendor: http://www.subrion.org # Google Dork: "Powered...
  22. Exploiter

    Exploit NETGATE Data Backup build 3.0.605 - Unquoted Service Path Privilege Escalation

    NETGATE Data Backup build 3.0.605 - Unquoted Service Path Privilege Escalation ######################################################################### # Exploit Title: NETGATE Data Backup Unquoted Service Path Privilege Escalation # Date: 15/10/2016 # Author: Amir.ght # Vendor Homepage...
  23. Exploiter

    Exploit Billion ADSL Router 400G 20151105641 - Cross-Site Scripting

    Billion ADSL Router 400G 20151105641 - Cross-Site Scripting # Exploit Title: Billion ADSL Router 400G 20151105641 - Cross-Site Scripting # Author: Cakes # Discovery Date: 2018-09-30 # Vendor Homepage: http://www.billion.com # Software Link: http://billionfirmware.co.za # Tested Version...
  24. Exploiter

    Exploit Student Information System (SIS) 0.1 - Authentication Bypass

    Student Information System (SIS) 0.1 - Authentication Bypass # Exploit Title............... Student Information System (SIS) Auth Bypass # Google Dork................. N/A # Date........................ 14/10/2016 # Exploit Author.............. lahilote # Vendor Homepage...
  25. Exploiter

    Exploit Graylog Collector 0.4.2 - Unquoted Service Path Privilege Escalation

    Graylog Collector 0.4.2 - Unquoted Service Path Privilege Escalation # Exploit Title: Graylog Collector Service Path Privilege Escalation # Date: 10/14/2016 # Exploit Author: Joey Lane # Software Link: https://github.com/Graylog2/collector # Version: 0.4.2 # Tested on: Windows Server 2012 R2...