• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

control

  1. 1

    Exploits AUO SunVeillance Monitoring System 1.1.9e Incorrect Access Control

    AUO SunVeillance Monitoring System version 1.1.9e suffers from an incorrect access control vulnerability. View the full article
  2. 1

    Exploits GFI Kerio Control 9.3.0 Cross Site Scripting

    GFI Kerio Control firewall version 9.3.0 suffers from a cross site scripting vulnerability. View the full article
  3. 1

    Exploits Control Web Panel 0.9.8.851 Privilege Escalation

    Control Web Panel version 0.9.8.851 suffers from multiple privilege escalation vulnerabilities. View the full article
  4. 0x1

    C3 Custom Command and Control

    C3 Custom Command and Control C3 (Custom Command and Control) is a tool that allows Red Teams to rapidly develop and utilise esoteric command and control channels (C2). It’s a framework that extends other red team tooling, such as the commercial Cobalt Strike (CS) product via ExternalC2...
  5. 1

    Exploits Totaljs CMS 12.0 Improper Access Control

    Totaljs CMS version 12.0 suffers from a broken access control on an API call. View the full article
  6. 1

    Exploits CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery

    CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability. View the full article
  7. 1

    Exploits CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting

    CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability. View the full article
  8. 1

    Exploits CentOS Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change

    CentOS Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. View the full article
  9. 1

    Exploits CentOS Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop

    CentOS Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. View the full article
  10. 1

    Exploits CentOS Control Web Panel (CWP) 0.9.8.848 User Enumeration

    CentOS Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. View the full article
  11. dEEpEst

    MyShadow | Take Control Of Your Data | Security & Anonymity

    Hidden content
  12. 1

    Exploits CentOS Control Web Panel 0.9.8.846 Cross Site Scripting

    CentOS Control Web Panel (CWP) version 0.9.8.846 suffers from a reflective cross site scripting vulnerability. View the full article
  13. 1

    Exploits CentOS Control Web Panel 0.9.8.840 User Enumeration

    CentOS Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability. View the full article
  14. 1

    Exploits CentOS Control Web Panel 0.9.8.836 Remote Command Execution

    CentOS Control Web Panel (CWP) version 0.9.8.836 suffers from a remote command execution vulnerability. View the full article
  15. 1

    Exploits CentOS Control Web Panel 0.9.8.838 User Enumeration

    CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability. View the full article
  16. 1

    Exploits CentOS Control Web Panel 0.9.8.836 Authentication Bypass

    CentOS Control Web Panel version 0.9.8.836 suffers from an authentication bypass vulnerability. View the full article
  17. 1

    Exploits CentOS Control Web Panel 0.9.8.836 Privilege Escalation

    CentOS Control Web Panel version 0.9.8.836 suffers from a privilege escalation vulnerability. View the full article
  18. 1

    Exploits FaceSentry Access Control System 6.4.8 Cleartext Password Storage

    FaceSentry Access Control System version 6.4.8 credentials used for accessing the web front end are stored unencrypted on the device in /faceGuard/database/FaceSentryWeb.sqlite. View the full article
  19. 1

    Exploits FaceSentry Access Control System 6.4.8 Authentication Credential Disclosure

    FaceSentry Access Control System version 6.4.8 suffers from a cleartext transmission of sensitive information. This allows a remote attacker to intercept the HTTP Cookie authentication credentials via a man-in-the-middle attack. View the full article
  20. 1

    Exploits FaceSentry Access Control System 6.4.8 Reflected Cross Site Scripting

    FaceSentry Access Control System version 6.4.8 is vulnerable to multiple cross site scripting vulnerabilities. This issue is due to the application's failure to properly sanitize user-supplied input thru the 'msg' parameter (GET) in pluginInstall.php script. An attacker may leverage any of the...
Back
Top