February 25th, 2021 📆 | 5060 Views ⚑
# -*- coding: utf-8 -*-import socketfrom time import sleepfrom os import system system(“clear”)print ‘Shell-code-foi-informada?rn’print ‘1] sim’print ‘2] naon’quest = int(input(‘>>>
February 25th, 2021 📆 | 8520 Views ⚑
VMware vCenter version 6.5 and 7.0 remote code execution proof of concept exploit. Source link
February 25th, 2021 📆 | 6544 Views ⚑
# Exploit Title: python jsonpickle 2.0.0 – Remote Code Execution# Date: 24-2-2021# Vendor Homepage: https://jsonpickle.github.io# Exploit Author: Adi Malyanker, Shay
February 24th, 2021 📆 | 1751 Views ⚑
# Exploit Title: Unified Remote 3.9.0.2463 – Remote Code Execution# Author: H4rk3nz0# Vendor Homepage: https://www.unifiedremote.com/# Software Link: https://www.unifiedremote.com/download# Tested on:
February 24th, 2021 📆 | 4412 Views ⚑
VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite. “The vSphere Client
February 24th, 2021 📆 | 5037 Views ⚑
# Exploit Title: Unified Remote 3.9.0.2463 - Remote Code Execution # Author: H4rk3nz0 # Vendor Homepage: https://www.unifiedremote.com/ # Software Link:
February 24th, 2021 📆 | 3369 Views ⚑
# Exploit Title: python jsonpickle 2.0.0 - Remote Code Execution # Date: 24-2-2021 # Vendor Homepage: https://jsonpickle.github.io # Exploit Author:
February 23rd, 2021 📆 | 5816 Views ⚑
# Exploit Title: HFS (HTTP File Server) 2.3.x – Remote Command Execution (3)# Google Dork: intext:”httpfileserver 2.3″# Date: 20/02/2021# Exploit
February 23rd, 2021 📆 | 2256 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck def initialize(info
February 23rd, 2021 📆 | 1828 Views ⚑
# Exploit Title: HFS (HTTP File Server) 2.3.x - Remote Command Execution (3) # Google Dork: intext:"httpfileserver 2.3" # Date:
February 19th, 2021 📆 | 3689 Views ⚑
# Exploit Title: Gitea 1.12.5 – Remote Code Execution (Authenticated)# Date: 17 Feb 2020# Exploit Author: Podalirius# PoC demonstration article:
February 18th, 2021 📆 | 5815 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/64f2fd4dbd9039e5bc054f475eaa582a_B.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Agent.aakVulnerability: Cross Site Request Forgery (CSRF) –
February 18th, 2021 📆 | 7572 Views ⚑
# Exploit Title: Batflat CMS 1.3.6 – Remote Code Execution (Authenticated)# Date: 2020-12-27# Exploit Author: mari0x00# Vendor Homepage: https://batflat.org/# Software
February 18th, 2021 📆 | 7844 Views ⚑
# Exploit Title: Batflat CMS 1.3.6 - Remote Code Execution (Authenticated) # Date: 2020-12-27 # Exploit Author: mari0x00 # Vendor
February 18th, 2021 📆 | 7294 Views ⚑
# Exploit Title: Gitea 1.12.5 - Remote Code Execution (Authenticated) # Date: 17 Feb 2020 # Exploit Author: Podalirius #
February 17th, 2021 📆 | 8516 Views ⚑
SEC Consult Vulnerability Lab Security Advisory < 20210217-0 >=======================================================================title: Multiple Vulnerabilitiesproduct: IrfanView – WPG.dll pluginvulnerable version: IrfanView 4.57/WPG.dll version 2.0.0.0fixed
February 12th, 2021 📆 | 6570 Views ⚑
Discovery / credits: Malvuln – malvuln.com (c) 2021Original source: https://malvuln.com/advisory/1b557d4f923b0de75e397686053a9022.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Augudor.aVulnerability: Unauthenticated Remote File Write Code ExecutionDescription:
February 11th, 2021 📆 | 7108 Views ⚑
# Exploit Title: Online Marriage Registration System (OMRS) 1.0 - Remote code execution (3) # Date: 10/02/2021 # Exploit Author:
February 11th, 2021 📆 | 8129 Views ⚑
# Exploit Title: Node.JS – ‘node-serialize’ Remote Code Execution (2)# Exploit Author: UndeadLarva# Software Link: https://www.npmjs.com/package/node-serialize# Version: 0.0.4# CVE: CVE-2017-5941
February 10th, 2021 📆 | 5169 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::Java::HTTP::ClassLoaderprepend Msf::Exploit::Remote::AutoCheckdef
Comments