Quantcast
Channel: Exploit Collector
Browsing all 13315 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Joomla Ajax Quiz 1.8 SQL Injection

Joomla Ajax Quiz component version 1.8 suffers from a remote SQL injection vulnerability.MD5 | d4ed9a9f7d426040140918b7d30f0178Download# # # # ## Exploit Title: Joomla! Component Ajax Quiz 1.8 - SQL...

View Article


Image may be NSFW.
Clik here to view.

Mozilla Firefox nsHtml5TreeBuilder Use-After-Free

Mozilla Firefox versions prior to 45 nsHtml5TreeBuilder use-after-free exploit with EMET 5.52 bypass.MD5 | 8008f48b0fd538cf58c28aaca53512bfDownload<!doctype html><html><head><meta...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Edge Chakra NULL Pointer Dereference

Microsoft Edge Chakra suffers from a null pointer dereference vulnerability.MD5 | 1e8d0ccd928df284ba3b75f58f8130adDownload<!--Report by Huang Anwen, He Xiaoxiao of ichunqiu Ker TeamThe issue could...

View Article

Image may be NSFW.
Clik here to view.

Mandos Encrypted File System Unattended Reboot Utility 1.7.16

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk...

View Article

Image may be NSFW.
Clik here to view.

Linux/x86-64 Reverse TCP Shell Shellcode

153 bytes small Linux/x86-64 reverse TCP shell shellcode that binds to 192.168.1.2:4444.MD5 | 61d0bff1874dee43bdda29cd1ada3ad1Download/*;Title: Linux/x86_64 - Reverse Shell Shellcode...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Edge Chakra chakra!Js::GlobalObject Integer Overflow

Microsoft Edge Chakra suffers from a chakra!Js::GlobalObject internet overflow vulnerability.MD5 | 27bc98a6edda5dac2e242517a2a0c314Download<!--Report by Huang Anwen, He Xiaoxiao of ichunqiu Ker...

View Article

Image may be NSFW.
Clik here to view.

Apache2Triad 1.5.4 CSRF / XSS / Session Fixation

Apache2Triad version 1.5.4 suffers from session fixation, cross site request forgery, and cross site scripting vulnerabilities.MD5 | 5f84ac13f6c4c57a37441585b0a25c8bDownload[+] Credits: John Page AKA...

View Article

Image may be NSFW.
Clik here to view.

Disk Pulse Enterprise 9.9.16 - 'Import Command' Buffer Overflow

EDB-ID: 42536Author: Anurag SrivastavaPublished: 2017-08-22CVE: N/A Type: LocalPlatform: WindowsVulnerable App: # Exploit Title : Disk Pulse Enterprise 9.9.16 - 'Import Command' Buffer Overflow #...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Windows - Escalate UAC Protection Bypass (Via COM Handler Hijack)...

EDB-ID: 42540Author: MetasploitPublished: 2017-08-22CVE: N/A Type: LocalPlatform: WindowsAliases: N/AAdvisory/Source: LinkTags: Metasploit Framework, LocalVulnerable App: N/A # This module requires...

View Article


Image may be NSFW.
Clik here to view.

Sync Breeze Enterprise 9.9.16 Buffer Overflow

Sync Breeze Enterprise version 9.9.16 suffers from a buffer overflow vulnerability.MD5 | 649a8043481d1251c34c53ffd21bb3f3Download#!/usr/bin/python# Exploit Title : Sync Breeze Enterprise 9.9.16 -...

View Article

Image may be NSFW.
Clik here to view.

Disk Sorter Enterprise 9.9.12 Buffer Overflow

Disk Sorter Enterprise version 9.9.12 suffers from a buffer overflow vulnerability.MD5 | 6961e113a3ac24650472c1e61138e4ecDownload#!/usr/bin/python# Exploit Title : Disk Sorter Enterprise v9.9.12 -...

View Article

Image may be NSFW.
Clik here to view.

Avira Antivirus Remote Heap Underflow Vulnerability

Avira Antivirus is prone to a remote heap-underflow vulnerability. Successfully exploiting this vulnerability may allow remote attackers to execute arbitrary code in the context of the application....

View Article

Image may be NSFW.
Clik here to view.

Jenkins Git Plugin CVE-2017-1000092 Cross Site Request Forgery Vulnerability

Git Plugin for Jenkins is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected...

View Article


Image may be NSFW.
Clik here to view.

Disk Pulse Enterprise 9.9.16 Buffer Overflow

Disk Pulse Enterprise version 9.9.16 suffers from a buffer overflow vulnerability.MD5 | 26d38ff2408eafa19af8bb94079c203dDownload#!/usr/bin/python# Exploit Title : Disk Pulse Enterprise 9.9.16 - 'Import...

View Article

Image may be NSFW.
Clik here to view.

IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution

This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP...

View Article


Image may be NSFW.
Clik here to view.

VMware VDP Known SSH Key

VMware vSphere Data Protection appliances 5.5.x through 6.1.x contain a known ssh private key for the local user admin who is a sudoer without password.MD5 | 78afbce4852e1d46d51d532f9a44d891Download###...

View Article

Image may be NSFW.
Clik here to view.

Windows Escalate UAC Protection Bypass (Via COM Handler Hijack)

This Metasploit module will bypass Windows UAC by creating COM handler registry entries in the HKCU hive. When certain high integrity processes are loaded, these registry entries are referenced...

View Article


Image may be NSFW.
Clik here to view.

Backdrop CMS 1.7.1 Cross Site Scripting

Backdrop CMS versions 1.7.1 and below suffer from a persistent cross site scripting vulnerability.MD5 | 3a5a51d7bbe3c89f83373c95b27188e1Download=============================================MGC ALERT...

View Article

Image may be NSFW.
Clik here to view.

WebClientPrint Processor 2.0.15.190 Print Jobs Remote Code Execution

WebClientPrint Processor version 2.0.15.109 suffers from a remote code execution vulnerability via print jobs.MD5 | f0de493e09096c617a8989b48f1d528dDownloadAdvisory: WebClientPrint Processor 2.0:...

View Article

Image may be NSFW.
Clik here to view.

WebClientPrint Processor 2.0.15.109 TLS Validation

RedTeam Pentesting discovered that WebClientPrint Processor (WCPP) does not validate TLS certificates when initiating HTTPS connections. Thus, a man-in-the-middle attacker may intercept and/or modify...

View Article
Browsing all 13315 articles
Browse latest View live