• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

user

  1. 1

    Exploits OpenSSH User Enumeration

    OpenSSH versions prior to 7.7 suffer from a user enumeration vulnerability. View the full article
  2. T

    CVE-2018-10949 - Zimbra Collaboration User Enumeration

    Zimbra Collaboration User Enumeration Script (CVE-2018-10949) How to use The argument --host must be the hostname or IP address of Zimbra Collaboration Web Application root page, and --userlist an list of usernames to check against it.   root@kali# ./cve-2018-10949-user-enum.py --host...
  3. T

    CVE-2018-15473 Openssh User enumeration

    CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats Threading - default 5 If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries Single username evaluation via username parameter Multiple username evaluation...
  4. 1

    Exploits BMC Remedy 7.1 User Impersonation

    An impersonation issue in BMC Remedy version 7.1 may lead to incorrect user context in Remedy AR System Server. View the full article
  5. 1

    Exploits Linux Nested User Namespace idmap Limit Local Privilege Escalation

    This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation to root (CVE-2018-18955). The target system must have unprivileged user namespaces...
  6. 1

    Exploits Intel Rapid Storage Technology User Interface And Driver 15.9.0.1015 DLL Hijacking

    Intel Rapid Storage Technology User Interface and Driver version 15.9.0.1015 suffers from a dll hijacking vulnerability. View the full article
  7. 1

    Exploits WordPress WP User Manager 2.0.8 SQL Injection

    WordPress WP User Manager plugin version 2.0.8 suffers from a remote time-based SQL injection vulnerability. View the full article
  8. 1

    Exploits CI User Login And Management 1.0 Shell Upload

    CI User Login and Management version 1.0 suffers from a remote shell upload vulnerability. View the full article
  9. 1

    Exploits Microsoft Windows 10 User Sessions Stuck

    This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's...
  10. 1

    Exploits WebExec Authenticated User Code Execution

    This Metasploit module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" module, except allows any non-guest account by default. View the full article
  11. 1

    Exploits Microsoft Active Directory Federated Services (ADFS) User Enumeration

    Microsoft Active Directory Federated Services (ADFS) suffers from a time-based user enumeration vulnerability. View the full article
  12. 1

    Exploits User Management 1.1 Cross Site Scripting

    User Management version 1.1 suffers from a cross site scripting vulnerability. View the full article
  13. 1

    Exploits ownCloud 0.1.2 User Impersonation Authorization Bypass

    ownCloud version 0.1.2 suffers from a user impersonation authorization bypass vulnerability. View the full article
Back
Top