Joomla Ajax Quiz 1.8 SQL Injection
Joomla Ajax Quiz component version 1.8 suffers from a remote SQL injection vulnerability.MD5 | d4ed9a9f7d426040140918b7d30f0178Download# # # # ## Exploit Title: Joomla! Component Ajax Quiz 1.8 - SQL...
View ArticleMozilla Firefox nsHtml5TreeBuilder Use-After-Free
Mozilla Firefox versions prior to 45 nsHtml5TreeBuilder use-after-free exploit with EMET 5.52 bypass.MD5 | 8008f48b0fd538cf58c28aaca53512bfDownload<!doctype html><html><head><meta...
View ArticleMicrosoft Edge Chakra NULL Pointer Dereference
Microsoft Edge Chakra suffers from a null pointer dereference vulnerability.MD5 | 1e8d0ccd928df284ba3b75f58f8130adDownload<!--Report by Huang Anwen, He Xiaoxiao of ichunqiu Ker TeamThe issue could...
View ArticleMandos Encrypted File System Unattended Reboot Utility 1.7.16
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk...
View ArticleLinux/x86-64 Reverse TCP Shell Shellcode
153 bytes small Linux/x86-64 reverse TCP shell shellcode that binds to 192.168.1.2:4444.MD5 | 61d0bff1874dee43bdda29cd1ada3ad1Download/*;Title: Linux/x86_64 - Reverse Shell Shellcode...
View ArticleMicrosoft Edge Chakra chakra!Js::GlobalObject Integer Overflow
Microsoft Edge Chakra suffers from a chakra!Js::GlobalObject internet overflow vulnerability.MD5 | 27bc98a6edda5dac2e242517a2a0c314Download<!--Report by Huang Anwen, He Xiaoxiao of ichunqiu Ker...
View ArticleApache2Triad 1.5.4 CSRF / XSS / Session Fixation
Apache2Triad version 1.5.4 suffers from session fixation, cross site request forgery, and cross site scripting vulnerabilities.MD5 | 5f84ac13f6c4c57a37441585b0a25c8bDownload[+] Credits: John Page AKA...
View ArticleDisk Pulse Enterprise 9.9.16 - 'Import Command' Buffer Overflow
EDB-ID: 42536Author: Anurag SrivastavaPublished: 2017-08-22CVE: N/A Type: LocalPlatform: WindowsVulnerable App: # Exploit Title : Disk Pulse Enterprise 9.9.16 - 'Import Command' Buffer Overflow #...
View ArticleMicrosoft Windows - Escalate UAC Protection Bypass (Via COM Handler Hijack)...
EDB-ID: 42540Author: MetasploitPublished: 2017-08-22CVE: N/A Type: LocalPlatform: WindowsAliases: N/AAdvisory/Source: LinkTags: Metasploit Framework, LocalVulnerable App: N/A # This module requires...
View ArticleSync Breeze Enterprise 9.9.16 Buffer Overflow
Sync Breeze Enterprise version 9.9.16 suffers from a buffer overflow vulnerability.MD5 | 649a8043481d1251c34c53ffd21bb3f3Download#!/usr/bin/python# Exploit Title : Sync Breeze Enterprise 9.9.16 -...
View ArticleDisk Sorter Enterprise 9.9.12 Buffer Overflow
Disk Sorter Enterprise version 9.9.12 suffers from a buffer overflow vulnerability.MD5 | 6961e113a3ac24650472c1e61138e4ecDownload#!/usr/bin/python# Exploit Title : Disk Sorter Enterprise v9.9.12 -...
View ArticleAvira Antivirus Remote Heap Underflow Vulnerability
Avira Antivirus is prone to a remote heap-underflow vulnerability. Successfully exploiting this vulnerability may allow remote attackers to execute arbitrary code in the context of the application....
View ArticleJenkins Git Plugin CVE-2017-1000092 Cross Site Request Forgery Vulnerability
Git Plugin for Jenkins is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected...
View ArticleDisk Pulse Enterprise 9.9.16 Buffer Overflow
Disk Pulse Enterprise version 9.9.16 suffers from a buffer overflow vulnerability.MD5 | 26d38ff2408eafa19af8bb94079c203dDownload#!/usr/bin/python# Exploit Title : Disk Pulse Enterprise 9.9.16 - 'Import...
View ArticleIBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution
This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP...
View ArticleVMware VDP Known SSH Key
VMware vSphere Data Protection appliances 5.5.x through 6.1.x contain a known ssh private key for the local user admin who is a sudoer without password.MD5 | 78afbce4852e1d46d51d532f9a44d891Download###...
View ArticleWindows Escalate UAC Protection Bypass (Via COM Handler Hijack)
This Metasploit module will bypass Windows UAC by creating COM handler registry entries in the HKCU hive. When certain high integrity processes are loaded, these registry entries are referenced...
View ArticleBackdrop CMS 1.7.1 Cross Site Scripting
Backdrop CMS versions 1.7.1 and below suffer from a persistent cross site scripting vulnerability.MD5 | 3a5a51d7bbe3c89f83373c95b27188e1Download=============================================MGC ALERT...
View ArticleWebClientPrint Processor 2.0.15.190 Print Jobs Remote Code Execution
WebClientPrint Processor version 2.0.15.109 suffers from a remote code execution vulnerability via print jobs.MD5 | f0de493e09096c617a8989b48f1d528dDownloadAdvisory: WebClientPrint Processor 2.0:...
View ArticleWebClientPrint Processor 2.0.15.109 TLS Validation
RedTeam Pentesting discovered that WebClientPrint Processor (WCPP) does not validate TLS certificates when initiating HTTPS connections. Thus, a man-in-the-middle attacker may intercept and/or modify...
View Article