Friday, April 19, 2024

Category

Vulnerabilities

Top Vulnerabilities Exploited in 2022 as revealed by FBI, CISA, and NSA

The year 2022 witnessed a surge in cyberattacks by malicious actors targeting unpatched, internet-facing systems. In a joint Cybersecurity Advisory (CSA), top cybersecurity agencies...

A word from our sponsor

spot_img

WonderCMS 3.1.3 – ‘content’ Persistent Cross-Site Scripting

# Exploit Title: WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting # Exploit...

Boxoft Convert Master 1.3.0 – ‘wav’ SEH Local Exploit

# Exploit Title: Boxoft Convert Master 1.3.0 - 'wav' SEH Local...

Free MP3 CD Ripper 2.8 – Multiple File Buffer Overflow (Metasploit)

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule <...

Apache Struts 2.5.20 – Double OGNL evaluation POC

Exploit Title: Apache Struts 2.5.20 - Double OGNL evaluation # Exploit Author:...

Artworks Gallery Exploit 1.0 Shell Upload Vulnerability

Artworks Gallery Exploit - Arbitrary File Upload - RCE (Authenticated) CVE-2020-28688 ...

AIX 5.3L /usr/sbin/lquerypv local root privilege escalation

AIX 5.3L /usr/sbin/lquerypv Local Root Privilege Escalation Exploit AIX5.3L...

ASUS TM-AC1900 Arbitrary Command Execution Exploit

This Metasploit module exploits an arbitrary file upload vulnerability in HorizontCMS...

October CMS Build 465 – Arbitrary File Read Exploit (Authenticated) 11-13

Date added: 2020-11-13 Just one of many vulns discovered on this cms. #...

Microsoft Windows Local Spooler Bypass Vulnerability

One way of exploiting this on Windows 10 200x is to...

SaltStack Salt REST API Arbitrary Command Execution Exploit

Date added 12-11-2020 This Metasploit module exploits an authentication bypass and command...