Результаты поиска

  1. Exploiter

    Exploit WSO2 Carbon 4.4.5 - Local File Inclusion

    WSO2 Carbon 4.4.5 - Local File Inclusion [+] Credits: John Page aka HYP3RLINX [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-LOCAL-FILE-INCLUSION.txt [+] ISR: ApparitionSec Vendor: =============== www.wso2.com Product...
  2. Exploiter

    Exploit WSO2 Carbon 4.4.5 - Persistent Cross-Site Scripting

    WSO2 Carbon 4.4.5 - Persistent Cross-Site Scripting [+] Credits: John Page aka HYP3RLINX [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-PERSISTENT-XSS-COOKIE-THEFT.txt [+] ISR: ApparitionSec Vendor: =============...
  3. Exploiter

    Exploit WSO2 Carbon 4.4.5 - Denial of Service / Cross-Site Request Forgery

    WSO2 Carbon 4.4.5 - Denial of Service / Cross-Site Request Forgery [+] Credits: John Page aka HYP3RLINX [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-CSRF-DOS.txt [+] ISR: ApparitionSec Vendor: ============ www.wso2.com...
  4. Exploiter

    Exploit Easylogin Pro 1.3.0 - 'Encryptor.php' Unserialize Remote Code Execution

    Easylogin Pro 1.3.0 - 'Encryptor.php' Unserialize Remote Code Execution #!/usr/bin/php <?php /* Easylogin Pro Encryptor.php Unserialize Remote Code Execution Vulnerability Version: 1.3.0 Platform: Ubuntu Server 18.04.1 Bug found by: @f99942 Tekniq/exploit by: @steventseeley (mr_me) CVE...
  5. Exploiter

    Exploit Project64 2.3.2 - Denial Of Service (PoC)

    Project64 2.3.2 - Denial Of Service (PoC) # Exploit Title: Project64 2.3.2 - Denial Of Service (PoC). # Author: Gionathan "John" Reale # Discovey Date: 2018-08-21 # Homepage: https://www.pj64-emu.com # Software Link:https://www.pj64-emu.com/download/project64-latest # Tested Version: 2.3.2 #...
  6. Exploiter

    Exploit Microsoft Word 2013/2016 - sprmSdyaTop Denial of Service (MS16-099)

    Microsoft Word 2013/2016 - sprmSdyaTop Denial of Service (MS16-099) ##################################################################################### # Application: Microsoft Office Word # Platforms: Windows, OSX # Versions: Microsoft Office Word 2013,2016 # Author: Francis Provencher of...
  7. Exploiter

    Exploit WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities

    WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities [+] Credits: John Page aka HYP3RLINX [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt [+] ISR: ApparitionSec Vendor: =============...
  8. Exploiter

    Exploit SAP SAPCAR - Multiple Vulnerabilities

    SAP SAPCAR - Multiple Vulnerabilities 1. Advisory Information Title: SAP CAR Multiple Vulnerabilities Advisory ID: CORE-2016-0006 Advisory URL: http://www.coresecurity.com/advisories/sap-car-multiple-vulnerabilities Date published: 2016-08-09 Date of last update: 2016-08-09 Vendors contacted...
  9. Exploiter

    Exploit Restorator 1793 - Denial of Service (PoC)

    Restorator 1793 - Denial of Service (PoC) # Exploit Title: Restorator 1793 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-19 # Homepage: https://www.bome.com/ # Software Link: https://www.bome.com/bome/downloads/Restorator2018_Full_1793.exe # Tested...
  10. Exploiter

    Exploit Prime95 29.4b7 - Denial Of Service (PoC)

    Prime95 29.4b7 - Denial Of Service (PoC) # Exploit Title: Prime95 29.4b7 - Denial Of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-20 # Homepage: http://www.mersenne.org # Software Link: http://www.mersenne.org/ftp_root/gimps/p95v294b7.win32.zip # Tested Version...
  11. Exploiter

    Exploit Microsoft Word 2007/2010/2013/2016 - Out-of-Bounds Read Code Execution (MS16-099)

    Microsoft Word 2007/2010/2013/2016 - Out-of-Bounds Read Code Execution (MS16-099) ##################################################################################### # Application: Microsoft Office Word # Platforms: Windows, OSX # Versions: Microsoft Office Word 2007,2010,2013,2016 #...
  12. Exploiter

    Exploit Microsoft Edge Chakra JIT - InitializeNumberFormat and InitializeDateTimeFormat Type Confusion

    Microsoft Edge Chakra JIT - InitializeNumberFormat and InitializeDateTimeFormat Type Confusion /* The InitializeNumberFormat function in Intl.js is used to initialize an Intl.NumberFormat object, and InitializeDateTimeFormat is used for an Intl.DateTimeFormat object. There are two versions of...
  13. Exploiter

    Exploit Zortam MP3 Media Studio 23.95 - Denial of Service (PoC)

    Zortam MP3 Media Studio 23.95 - Denial of Service (PoC) # Exploit Title: Zortam MP3 Media Studio 23.95 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-19 # Homepage: https://www.zortam.com # Software Link: https://www.zortam.com/download.html # Tested...
  14. Exploiter

    Exploit Microsoft Edge Chakra JIT - Parameter Scope Parsing Type Confusion

    Microsoft Edge Chakra JIT - Parameter Scope Parsing Type Confusion // PoC: async function trigger(a = class b { [await 1]() { } }) { } let spray = []; for (let i = 0; i < 100000; i++) { spray.push(parseFloat.bind(1, 0x1234, 0x1234, 0x1234, 0x1234)); } trigger(); /* The PoC is...
  15. Exploiter

    Exploit Microsoft Edge Chakra JIT - 'DictionaryPropertyDescriptor::CopyFrom' Type Confusion

    Microsoft Edge Chakra JIT - 'DictionaryPropertyDescriptor::CopyFrom' Type Confusion /* Here's the method. template <typename TPropertyIndex> template <typename TPropertyIndexFrom> void...
  16. Exploiter

    Exploit Microsoft Edge Chakra JIT - 'InlineArrayPush' Type Confusion

    Microsoft Edge Chakra JIT - 'InlineArrayPush' Type Confusion /* This is similar to issue 1531 . The patch seems to prevent type confusion triggered from StElemI_A instructions. But the SetItem method can also be invoked through the Array.prototype.push method which can be inlineed. We can...
  17. Exploiter

    Exploit Microsoft Windows 7 (x86/x64) - Group Policy Privilege Escalation (MS16-072)

    Microsoft Windows 7 (x86/x64) - Group Policy Privilege Escalation (MS16-072) # Exploit Title: Group Policy Elevation of Privilege Vulnerability # Date: 08-08-2016 # Exploit Author: Nabeel Ahmed # Tested on: Windows 7 Professional (x32/x64) # CVE : CVE-2016-3223 # Category: Privilege Escalation...
  18. Exploiter

    Exploit Microsoft Edge Chakra JIT - ImplicitCallFlags Check Bypass with Intl

    Microsoft Edge Chakra JIT - ImplicitCallFlags Check Bypass with Intl /* If the Intl object hasn't been initialized, access to any property of it will trigger the initialization process which will run Intl.js. The problem is that it runs Intl.js without caring about the ImplicitCallFlags flag...
  19. Exploiter

    Exploit WordPress Plugin Add From Server < 3.3.2 - Cross-Site Request Forgery (Arbitrary File Upload)

    WordPress Plugin Add From Server < 3.3.2 - Cross-Site Request Forgery (Arbitrary File Upload) Cross-Site Request Forgery vulnerability in Add From Server WordPress Plugin Abstract It was discovered that Add From Server is vulnerabile to Cross-Site Request Forgery. It can be exploited by...
  20. Exploiter

    Exploit Central Management Software 1.4.13 - Denial of Service (PoC)

    Central Management Software 1.4.13 - Denial of Service (PoC) # Exploit Title: Central Management Software v1.4.13 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-16 # Homepage: https://www.ambientweather.com # Software Link...
  21. Exploiter

    Exploit OpenSSH 2.3 < 7.7 - Username Enumeration (PoC)

    OpenSSH 2.3 < 7.7 - Username Enumeration (PoC) #!/usr/bin/env python # Copyright (c) 2018 Matthew Daley # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to # deal in the Software without...
  22. Exploiter

    Exploit CEWE Photoshow 6.3.4 - Denial of Service (PoC)

    CEWE Photoshow 6.3.4 - Denial of Service (PoC) # Exploit Title: CEWE Photoshow 6.3.4 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-17 # Homepage: https://cewe-photoworld.com/ # Software Link: https://cewe-photoworld.com/creator-software/windows-download #...
  23. Exploiter

    Exploit OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions

    OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions # Exploit Title: OpenEMR 5.0.1.3 - Arbitrary File Actions # Date: 2018-08-14 # Exploit Author: Joshua Fam # Twitter : @Insecurity # Vendor Homepage: https://www.open-emr.org/ # Software Link...
  24. Exploiter

    Exploit ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC)

    ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC) # Exploit Title: ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovey Date: 2018-08-16 # Homepage: https://www.ambientweather.com # Software Link...
  25. Exploiter

    Exploit Oracle Weblogic Server - Deserialization Remote Code Execution (Metasploit)

    Oracle Weblogic Server - Deserialization Remote Code Execution (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' class MetasploitModule <...