#!/usr/bin/python# -*- coding: cp1252 -*-# Exploit Title: Angry IP Scanner 3.5.3 Denial of Service (PoC)# Author: Fernando Cruz# Date: 13/12/2018# Vendor Homepage: https://angryip.org# Tested Version: 3.11# Tested on Windows 10 Pro, 64-bit# Steps to
#Exploit Title: Zortam MP3 Media Studio Version 24.15 Exploit (SEH)#Version: 24.15#Exploit Author: Manpreet Singh Kheberi#Date: December 13 2018#Download Link: https://www.zortam.com/download.html#Vendor Homepage: https://www.zortam.com#Tested on: W
#!/usr/bin/env python2####### Cisco RV110W Password Disclosure and OS Command Execute.### Tested on version: 1.1.0.9 (maybe useable on 1.2.0.9 and later.)# Exploit Title: Cisco RV110W Password Disclosure and OS Command Execute# Date: 2018-08# Exploi
# Exploit Title: UltraISO 9.7.1.3519 - 'Output FileName' Denial of Service (PoC) and Pointer to next SEH and SE handler records overwrite# Discovery by: Francisco Ramirez# Discovery Date: 2018-12-14# Vendor Homepage: https://www.ultraiso.com/# Softw
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::EXE include Msf::Exploit::Re
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::HttpServer include Ms
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking # this module overwrites the configuration file, b
Linux: userfaultfd bypasses tmpfs file permissions CVE-2018-18397Using the userfaultfd API, it is possible to first register auserfaultfd region for any VMA that fulfills vma_can_userfault():It must be an anonymous VMA (-vm_ops==NULL), a hugetlb VMA
WebKit: JIT: Int32/Double arrays can have Proxy objects in the prototype chains CVE-2018-4438Bug:void JSObject::setPrototypeDirect(VM vm, JSValue prototype){ ASSERT(prototype); if (prototype.isObject()) prototype.asCell()-didBecomePrototype(); if (s
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit Rank = NormalRanking include Msf::Exploit::FILEFORMAT def initialize(info={}) s
Chrome: malicious WPAD server can proxy localhost (leading to XSS in http://localhost:*/*) VERSIONChrome Version: 70.0.3538.77 stableOperating System: Windows 10 (version 1803)When Chrome is installed on Windows and the user joins a malicious networ