DB: 2022-01-29

5 changes to exploits/shellcodes
This commit is contained in:
Offensive Security 2022-01-29 05:02:01 +00:00
parent d3b7d652cc
commit 4dfb7acc62
5 changed files with 6 additions and 7 deletions

View file

@ -1,5 +1,5 @@
# Exploit Title: Online Voting System 1.0 - Authentication Bypass (SQLi)
# Exploit Author: deathflash1411
# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411)
# Date 30.06.2021
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/4808/voting-system-php.html

View file

@ -1,5 +1,5 @@
# Exploit Title: Online Voting System 1.0 - Remote Code Execution (Authenticated)
# Exploit Author: deathflash1411
# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411)
# Date 30.06.2021
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/4808/voting-system-php.html

View file

@ -1,9 +1,9 @@
# Exploit Title: Remote Mouse GUI 3.008 - Local Privilege Escalation
# Exploit Author: Salman Asad (@deathflash1411, salman@defmax.io)
# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411)
# Date: 17.06.2021
# Version: Remote Mouse 3.008
# Tested on: Windows 10 Pro Version 21H1
# Reference: https://deathflash.ml/blog/remote-mouse-lpe
# Reference: https://leobreaker1411.github.io/blog/cve-2021-35448
# CVE: CVE-2021-35448
Steps to reproduce:

View file

@ -1,9 +1,8 @@
# Exploit Title: Argus Surveillance DVR 4.0 - Weak Password Encryption
# Exploit Author: Salman Asad (@deathflash1411)
# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411)
# Date: 12.07.2021
# Version: Argus Surveillance DVR 4.0
# Tested on: Windows 7 x86 (Build 7601) & Windows 10
# Reference: https://deathflash1411.github.io/blog/cracking-argus-surveillance-passwords
# Note: Argus Surveillance DVR 4.0 configuration is present in
# C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini

View file

@ -1,5 +1,5 @@
# Exploit Title: XAMPP 7.4.3 - Local Privilege Escalation
# Exploit Author: Salman Asad (@deathflash1411, salman@defmax.io)
# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411)
# Original Author: Maximilian Barz (@S1lkys)
# Date: 27/09/2021
# Vendor Homepage: https://www.apachefriends.org