# Exploit developed using Exploit Pack v5.4 # Exploit Author: Juan Sacco - http://www.exploitpack.com - jsacco@exploitpack.com # Program affected: Threaded USENET news reader # Version: 3.6-23 # # Tested and developed under: Kali Linux 2.0 x86 - http
''' Acunetix WVS 10 - Remote command execution (SYSTEM privilege) - Author: Daniele Linguaglossa Overview ========= Acunetix WVS 10 [1] is an enterprise web vulnerability scanner developer by Acunetix Inc. Two major flaws exists in the last version o
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=692 Windows: CSRSS BaseSrvCheckVDM Session 0 Process Creation EoP Platform: Windows 8.1, not tested on Windows 10 or 7 Class: Elevation of Privilege Summary: The CSRSS BaseSrv RPC c
#!/usr/bin/env bash## Struts2 S2-032 checking tools.# author: 7ym0n.q6e/bb.qnyd@gmail.com# Copyleft (C) 2016 7ym0n.q6e. All rights reserved.## Struts S2-032 is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even t
#!/usr/bin/perl##################################################################This exploit uses command line arguments for different offsets # #So it can be tested on different systems *NIX Flavours # #############################################
''' # Exploit Author: Juan Sacco - http://www.exploitpack.com - jsacco@exploitpack.com # Program affected: General-purpose console screen reader # Version: 0.6.9-5 # # Tested and developed under: Kali Linux 2.0 x86 - https://www.kali.org # Program de
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## ## Original Exploit Information ## # Date: 29 Aug 2015 # Exploit Author: Koby # Tested on: Windows XP SP3 # Link:
Overview========libgd [1] is an open-source image library. It is perhaps primarily usedby the PHP project. It has been bundled with the default installationof PHP since version 4.3 [2].A signedness vulnerability (CVE-2016-3074) exist in libgd 2.1.1
function Invoke-MS16-032 { # .SYNOPSIS PowerShell implementation of MS16-032. The exploit targets all vulnerable operating systems that support PowerShell v2+. Credit for the discovery of the bug and the logic to exploit it go to James Forshaw (@tira