• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

control

  1. 1

    Exploits FaceSentry Access Control System 6.4.8 Remote SSH Root Access

    FaceSentry Access Control System version 6.4.8 facial biometric access control appliance ships with hard-coded and weak credentials for SSH access on port 23445 using the credentials wwwuser:123456. The root privilege escalation is done by abusing the insecure sudoers entry file. View the full...
  2. 1

    Exploits FaceSentry Access Control System 6.4.8 Remote Root

    FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script. View the full...
  3. 1

    Exploits FaceSentry Access Control System 6.4.8 Cross Site Request Forgery

    The FaceSentry Access Control System version 6.4.8 application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user...
  4. 1

    Exploits FaceSentry Access Control System 6.4.8 Remote Command Injection

    FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' and 'strInPort' parameters (POST) in pingTest and...
  5. 1

    Exploits AUO Solar Data Recorder Incorrect Access Control

    AUO Solar Data Recorder versions prior to 1.3.0 suffer from an incorrect access control vulnerability. View the full article
  6. 1

    Exploits SOCA Access Control System 180612 Cross Site Request Forgery

    SOCA Access Control System version 180612 suffers from a cross site request forgery vulnerability. View the full article
  7. 1

    Exploits SOCA Access Control System 180612 SQL Injection

    SOCA Access Control System version 180612 suffers from remote SQL injection vulnerabilities that allow for authentication bypass. View the full article
  8. 1

    Exploits SOCA Access Control System 180612 Cross Site Scripting

    SOCA Access Control System version 180612 suffers from a cross site scripting vulnerability. View the full article
  9. 1

    Exploits SOCA Access Control System 180612 Information Disclosure

    SOCA Access Control System version 180612 suffers from insecure direct object reference vulnerabilities that leak information like password hashes. View the full article
  10. 1

    Exploits SolarWinds DameWare Mini Remote Control 10.0 Denial Of Service

    SolarWinds DameWare Mini Remote Control version 10.0 suffers from a denial of service vulnerability. View the full article
  11. dEEpEst

    Insanity Framework - Generate Payloads and Control Remote Machines. [Discontinued]

    Insanity-Framework THIS PROJECT ARE CLOSED NOW - FEEL FREE TO CONTINUE IT Copyright 2017 Insanity Framework (IF) 2.0 END Written by: * Alisson Moretto - 4w4k3 Special Thanks to Thomas Perkins - Ekultek Insanity Payload consists of encrypting your code and decrypting it in memory, thus...
  12. 1

    Exploits Open-Xchange AppSuite 7.10.1 Information Disclosure / Improper Access Control

    Open-Xchange AppSuite versions 7.10.1 and below suffer from information exposure and improper access control vulnerabilities. View the full article
  13. 1

    Exploits PLC Wireless Router GPN2.4P21-C-CN Incorrect Access Control

    PLC Wireless Router GPN2.4P21-C-CN suffers from an incorrect access control vulnerability. View the full article
  14. dEEpEst

    Windows Access any control Setting On Windows

    Hidden content
  15. 1

    Exploits PLC Wireless Router GPN2.4P21-C-CN Incorrect Access Control

    PLC Wireless Router GPN2.4P21-C-CN suffers from an incorrect access control vulnerability. View the full article
  16. E

    Chromecast Hack - Control + curl [Research]

    > @title Chromecast Hack - Control @echo off :start echo ................................................... echo .       Chromecast Hack - Control                 . echo ................................................... set /p ip=" IP Address : " set /p id=" Youtube Video ID : " cls echo...
  17. 1

    Exploits ZTE Home Gateway ZXHN H168N 2.2 Access Control Bypass

    ZTE Home Gateway ZXHN H168N suffers from multiple access bypass and information disclosure vulnerabilities. View the full article
  18. 1

    Exploits XAMPP Control Panel 3.2.2 Buffer Overflow

    XAMPP Control Panel version 3.2.2 SEH unicode buffer overflow exploit. View the full article
  19. 1

    Exploits WiFiRanger 7.0.8rc3 Incorrect Access Control / Privilege Escalation

    WiFiRanger version 7.0.8rc3 suffers from an incorrect access control that allows for ftp retrieval of an RSA identity that an attacker can use to ssh in as root. View the full article
  20. 1

    Exploits Teltonika RUT9XX Missing Access Control To UART Root Terminal

    Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. View the full article
Back
Top