• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

exploits

  1. dEEpEst

    Exploits CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177: Linux OpenPrinting CUPS RCE

    CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177: Linux OpenPrinting CUPS RCE PoC: -=Stripped Content=- patch: sudo systemctl stop cups-browsed sudo systemctl disable cups-browsed
  2. dEEpEst

    Exploits CVE-2024-7479 & CVE-2024-7481: TeamViewer User to Kernel LPE

    CVE-2024-7479 & CVE-2024-7481: TeamViewer User to Kernel LPE CVE: https://nvd.nist.gov/vuln/detail/CVE-2024-7479 https://nvd.nist.gov/vuln/detail/CVE-2024-7481 PoC: -=Stripped Content=- exploit: -=Stripped Content=-
  3. A

    Cracking Scam Pages+Letters+Exploits+Tools Pack [Priv8]

    In Title says All for its potential users! Note: Source from a private group! LEGAL DISCLAIMER PLEASE READ! I am not responsible for any actions and or damages caused by this pack, and software I shared. You bear the full responsibility of your actions and acknowledge that these tools pack...
  4. T

    AuthMeBridge Exploit

    Here is the AuthMeBridge exploit that I have for long time now. I have used it plenty of times, very simple exploit but powerful if server uses AuthMeBridge session. Please note that this exploit only works on servers which use old AuthMeBridge plugin or similar session login plugins. Hidden...
  5. itsMe

    SpoolSploit: collection of Windows print spooler exploits

    SpoolSploit A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. Summary SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods...
  6. itsMe

    Findsploit v2.0 - Find exploits in local and online databases instantly

    Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c...
  7. dEEpEst

    Ransomware Verci Spy System RAT | Ransomware | NSA Exploits | UAC | Spread

    Verci Spy System RAT | Ransomware | NSA Exploits | UAC | Spread Verci Spy System  OR Verci_Spy_System   This Tool Was Designed By US,This Tool is a Remote Access Trojan That you can Take over any Windows machine into your control and can do many things within that infected PC , also the...
  8. 1

    Exploits Micro Focus (HPE) Data Protector SUID Privilege Escalation

    This Metasploit module exploits the trusted $PATH environment variable of the SUID binary omniresolve in Micro Focus (HPE) Data Protector versions A.10.40 and below. The omniresolve executable calls the oracleasm binary using a relative path and the trusted environment $PATH, which allows an...
  9. 1

    Exploits Packet Storm New Exploits For October, 2019

    This archive contains all of the 170 exploits added to Packet Storm in October, 2019. View the full article
  10. 1

    Exploits eIDAS-Node 2.3 Authentication Bypass

    eIDAS-Node versions 2.3 and below suffer from an authentication bypass vulnerability. View the full article
  11. 1

    Exploits Apache Solr 8.2.0 Remote Code Execution

    Apache Solr version 8.2.0 suffers from a remote code execution vulnerability. View the full article
  12. 1

    Exploits ownCloud 10.3.0 Stable Cross Site Request Forgery

    ownCloud version 10.3.0 Stable suffers from a cross site request forgery vulnerability. View the full article
  13. 1

    Exploits OpenVPN Private Tunnel 2.8.4 Unquoted Service Path

    OpenVPN Private Tunnel version 2.8.4 suffers from an ovpnagent unquoted service path vulnerability. View the full article
  14. 1

    Exploits TheJshen contentManagementSystem 1.04 SQL Injection

    TheJshen contentManagementSystem version 1.04 suffers from a remote SQL injection vulnerability. View the full article
  15. 1

    Exploits Mr Blog PHP Cross Site Scripting / SQL Injection

    Mr Blog PHP suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  16. 1

    Exploits Scripteen Image Upload Shell Upload

    Scripteen Image Upload script suffers from a shell upload vulnerability. View the full article
  17. 1

    Exploits Carel pCOWeb HVAC Insecure Credential Storage

    The Carel pCOWeb card stores password hashes in the file /etc/passwd, allowing privilege escalation by authenticated users. Additionally, plaintext copies of the passwords are stored. Version A 1.4.11 - B 1.4.2 is affected. View the full article
  18. 1

    Exploits Carel pCOWeb HVAC Modbus Interface Authentication Bypass

    The Carel pCOWeb card exposes a Modbus interface to the network. By design, Modbus does not provide authentication, allowing to control the affected system. Version A 1.4.11 - B 1.4.2 is affected. View the full article
  19. 1

    Exploits Nostromo 1.9.6 Directory Traversal / Remote Command Execution

    This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 1.9.6 and below. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request. View the...
  20. 1

    Exploits WordPress Google Review Slider 6.1 SQL Injection

    WordPress Google Review Slider plugin version 6.1 suffers from a remote SQL injection vulnerability. View the full article
Back
Top