From 4dfb7acc6215e5e3aaf019e8be0fc7750bfca1af Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 29 Jan 2022 05:02:01 +0000 Subject: [PATCH] DB: 2022-01-29 5 changes to exploits/shellcodes --- exploits/php/webapps/50075.txt | 2 +- exploits/php/webapps/50076.txt | 2 +- exploits/windows/local/50047.txt | 4 ++-- exploits/windows/local/50130.py | 3 +-- exploits/windows/local/50337.ps1 | 2 +- 5 files changed, 6 insertions(+), 7 deletions(-) diff --git a/exploits/php/webapps/50075.txt b/exploits/php/webapps/50075.txt index e14cddab6..5fce2da76 100644 --- a/exploits/php/webapps/50075.txt +++ b/exploits/php/webapps/50075.txt @@ -1,5 +1,5 @@ # Exploit Title: Online Voting System 1.0 - Authentication Bypass (SQLi) -# Exploit Author: deathflash1411 +# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411) # Date 30.06.2021 # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/4808/voting-system-php.html diff --git a/exploits/php/webapps/50076.txt b/exploits/php/webapps/50076.txt index 3aae4d12a..605f62300 100644 --- a/exploits/php/webapps/50076.txt +++ b/exploits/php/webapps/50076.txt @@ -1,5 +1,5 @@ # Exploit Title: Online Voting System 1.0 - Remote Code Execution (Authenticated) -# Exploit Author: deathflash1411 +# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411) # Date 30.06.2021 # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/4808/voting-system-php.html diff --git a/exploits/windows/local/50047.txt b/exploits/windows/local/50047.txt index 0a70ae0fe..cdd359770 100644 --- a/exploits/windows/local/50047.txt +++ b/exploits/windows/local/50047.txt @@ -1,9 +1,9 @@ # Exploit Title: Remote Mouse GUI 3.008 - Local Privilege Escalation -# Exploit Author: Salman Asad (@deathflash1411, salman@defmax.io) +# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411) # Date: 17.06.2021 # Version: Remote Mouse 3.008 # Tested on: Windows 10 Pro Version 21H1 -# Reference: https://deathflash.ml/blog/remote-mouse-lpe +# Reference: https://leobreaker1411.github.io/blog/cve-2021-35448 # CVE: CVE-2021-35448 Steps to reproduce: diff --git a/exploits/windows/local/50130.py b/exploits/windows/local/50130.py index 2df6a3daf..8c59edc57 100755 --- a/exploits/windows/local/50130.py +++ b/exploits/windows/local/50130.py @@ -1,9 +1,8 @@ # Exploit Title: Argus Surveillance DVR 4.0 - Weak Password Encryption -# Exploit Author: Salman Asad (@deathflash1411) +# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411) # Date: 12.07.2021 # Version: Argus Surveillance DVR 4.0 # Tested on: Windows 7 x86 (Build 7601) & Windows 10 -# Reference: https://deathflash1411.github.io/blog/cracking-argus-surveillance-passwords # Note: Argus Surveillance DVR 4.0 configuration is present in # C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini diff --git a/exploits/windows/local/50337.ps1 b/exploits/windows/local/50337.ps1 index 1b8380980..e1f816b76 100644 --- a/exploits/windows/local/50337.ps1 +++ b/exploits/windows/local/50337.ps1 @@ -1,5 +1,5 @@ # Exploit Title: XAMPP 7.4.3 - Local Privilege Escalation -# Exploit Author: Salman Asad (@deathflash1411, salman@defmax.io) +# Exploit Author: Salman Asad (@LeoBreaker1411 / deathflash1411) # Original Author: Maximilian Barz (@S1lkys) # Date: 27/09/2021 # Vendor Homepage: https://www.apachefriends.org