• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

disclosure

  1. 1

    Exploits Google Chrome Password Disclosure

    Google Chrome suffers from an issue where it will leak all passwords for a given domain. View the full article
  2. 1

    Exploits Rifatron Intelligent Digital Security System (animate.cgi) Stream Disclosure

    The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module. View the full article
  3. 1

    Exploits Craft CMS 2.7.9 / 3.2.5 Information Disclosure

    Craft CMS versions 2.7.9 and 3.2.5 suffers from an information disclosure vulnerability. View the full article
  4. 1

    Exploits Confluence Server Local File Disclosure

    Confluence Server versions 6.1.0 up to 6.6.16, 6.7.0 up to 6.13.7, and 6.14.0 up to 6.15.8 suffer from a file disclosure vulnerability. View the full article
  5. 1

    Exploits PilusCart 1.4.1 Local File Disclosure

    PilusCart versions 1.4.1 and below suffers from a file disclosure vulnerability. View the full article
  6. 1

    Exploits Pulse Secure SSL VPN File Disclosure NSE

    This is an Nmap NSE script to detect where or not a target is vulnerable to the Pulse Secure SSL VPN file disclosure vulnerability. It reads /etc/passwd. View the full article
  7. 1

    Exploits Zoho Corporation ManageEngine ServiceDesk Plus Information Disclosure

    Zoho Corporation ManageEngine ServiceDesk Plus 10 versions prior to 10509 suffer from an information leakage vulnerability. View the full article
  8. 1

    Exploits Pulse Secure SSL VPN 8.1R15.1 / 8.2 / 8.3 / 9.0 Arbitrary File Disclosure

    This Metasploit module exploits Pulse Secure SSL VPN versions 8.1R15.1, 8.2, 8.3, and 9.0 which suffer from an arbitrary file disclosure vulnerability. View the full article
  9. 1

    Exploits FortiOS 5.6.7 / 6.0.4 Credential Disclosure

    FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 suffer from a credential disclosure vulnerability. View the full article
  10. 1

    Exploits FortiOS 5.6.7 / 6.0.4 Credential Disclosure

    This Metasploit module exploits FortiOS versions 5.6.3 through 5.6.7 and 6.0.0 through 6.0.4 to leverage a credential disclosure vulnerability by reading the /dev/cmdb/sslvpn_websession file. View the full article
  11. 1

    Exploits D-Link 6600-AP XSS / DoS / Information Disclosure

    D-Link 6600-AP suffers from cross site scripting, key extraction, shell escape, config file disclosure, and denial of service vulnerabilities. View the full article
  12. 1

    Exploits REDDOXX Appliance Information Disclosure

    REDDOXX Appliance versions 2032-SP2 up to hotfix 51 suffer from an information disclosure vulnerability. View the full article
  13. 1

    Exploits FaceSentry Access Control System 6.4.8 Authentication Credential Disclosure

    FaceSentry Access Control System version 6.4.8 suffers from a cleartext transmission of sensitive information. This allows a remote attacker to intercept the HTTP Cookie authentication credentials via a man-in-the-middle attack. View the full article
  14. 1

    Exploits SAP Crystal Reports Information Disclosure

    SAP Crystal Reports suffers from an information disclosure vulnerability. View the full article
  15. 1

    Exploits D-Link Administrative Password Disclosure

    D-Link models DIR-652, DIR-615, DIR-827, DIR-615, DIR-657, and DIR-825 suffer from an administrative password disclosure vulnerability. View the full article
  16. 1

    Exploits Clever Dog Smart Camera DOG-2W / DOG-2W-V4 File Disclosure / Backdoor

    Clever Dog Smart Camera types DOG-2W and DOG-2W-V4 suffer from file disclosure, default telnet backdoor credential, and insecure transit vulnerabilities. View the full article
  17. 1

    Exploits Telus Actiontec WEB6000Q Serial Number Information Disclosure

    Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a serial number information disclosure vulnerability. The wireless extenders use DHCP Option 125 to include device details such as model number, manufacturer, and serial number. The WCB6000Q DHCP DISCOVER and REQUEST broadcasts...
  18. 1

    Exploits Telus Actiontec T2200H Serial Number Information Disclosure

    Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a serial number information disclosure vulnerability. The wireless extenders use DHCP Option 125 to include device details such as model number, manufacturer, and serial number. By forging a special DHCP packet using Option 125...
  19. 1

    Exploits Telus Actiontec T2200H WiFi Credential Disclosure

    Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a credential disclosure vulnerability. An HTTP interface used by wireless extenders to pull the modem's wifi settings uses DHCP client-provided option values to restrict access to this API. By forging DHCP packets, one can...
  20. 1

    Exploits Amcrest IPM-721S Credential Disclosure / Privilege Escalation

    Amcrest IPM-721S suffers from credential disclosure, privilege escalation, and a long list of other vulnerabilities. View the full article
Back
Top