Moodle Admin Shell Upload
Authored by h00die, Ozkan Mustafa Akkus | Site metasploit.com
This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running...
WordPress Pie Register 3.7.1.4 Privilege Escalation
Authored by Lotfi13-DZ
WordPress Pie Register plugin versions 3.7.1.4 and below suffer from a privilege escalation vulnerability.
Change Mirror Download
# Exploit Title: WordPress Plugin Pie Register 3.7.1.4 - Admin Privilege Escalation...
Simple Online College Entrance Exam System 1.0 Account Takeover
Authored by Amine
Simple Online College Entrance Exam System version 1.0 suffers from an account takeover vulnerability.
Change Mirror Download
# Exploit Title: Simple Online College Entrance Exam System 1.0 - Account...
Online Enrollment Management System 1.0 SQL Injection
Authored by Amine
Online Enrollment Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Change Mirror Download
# Exploit Title: Online Enrollment Management System 1.0...
Online Traffic Offense Management System 1.0 Privilege Escalation
Authored by snup
Online Traffic Offense Management System version 1.0 suffers from a privilege escalation vulnerability.
Change Mirror Download
# Exploit Title: Online Traffic Offense Management System 1.0 - Privilage escalation (Unauthenticated)#...
Maian-Cart 3.8 Remote Code Execution
Authored by DreyAnd, purpl3
Maian-Cart version 3.8 unauthenticated remote code execution exploit.
advisories | CVE-2021-32172
Change Mirror Download
# Exploit title: Maian-Cart 3.8 - Remote Code Execution (RCE) (Unauthenticated)# Date: 27.11.2020 19:35# Tested...
Dahua Authentication Bypass
Authored by bashis
Various Dahua products suffers from multiple authentication bypass vulnerabilities.
advisories | CVE-2021-33044, CVE-2021-33045
Change Mirror Download
Subject: : Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)Attack vector: RemoteAuthentication: Anonymous (no credentials needed)Researcher: bashis...
High Infinity Technology HiKam S6 1.3.26 Spoofing / Broken Authentication
Authored by Gerhard Hechenberger, S. Robertz | Site sec-consult.com
High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography,...
Google SLO-Generator 2.0.0 Code Execution
Authored by Kiran Ghimire
Google SLO-Generator versions 2.0.0 and below suffer from a code execution vulnerability.
advisories | CVE-2021-22557
Change Mirror Download
# Exploit Title: Google SLO-Generator 2.0.0 - Code Execution# Date: 2021-09-28#...
Online DJ Booking Management System 1.0 Cross Site Scripting
Authored by Yash Mahajan
Online DJ Booking Management System version 1.0 suffers from a cross site scripting vulnerability.
Change Mirror Download
# Exploit Title: Online DJ Booking Management System 1.0 - 'Multiple'...