exploits

  1. GhosTM@n

    Интересно Android Janus - APK Signature Bypass (****sploit) THROOT

  2. GhosTM@n

    Интересно VMware Fusion 11.5.2 - Privilege Escalation

    # Exploit Title: VMware Fusion 11.5.2 - Privilege Escalation # Date: 2020-03-17 # Exploit Author: Rich Mirch # Vendor Homepage: https://www.vmware.com/products/fusion.html # Vendor Advisory: https://www.vmware.com/security/advi...2020-0005.html # Software Link...
  3. GhosTM@n

    Интересно Prima FlexAir Access Control 2.3.38 - Remote Code Execution

    # Exploit Title: Prima FlexAir Access Control 2.3.38 - Remote Code Execution # Google Dork: NA # Date: 2018-09-06 # Exploit Author: LiquidWorm # Vendor Homepage: https://www.primasystems.eu/ # Software Link: https://primasystems.eu/flexair-access-control/ # Version: 2.3.38 # Tested on: NA # CVE...
  4. GhosTM@n

    Интересно Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting

    Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting # Exploit Title: Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting # Google Dork: NA # Date: 2018-09-06 # Exploit Author: Rishu Ranjan (Cy83rl0gger) # Vendor Homepage: https://www.myadrenalin.com/ #...
  5. GhosTM@n

    Интересно Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed JBIG2Globals Stream

    Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed JBIG2Globals Stream We have observed the following access violation exception in the latest version of Adobe Acrobat Reader DC for Windows, when opening a malformed PDF file: --- cut --- (88e4.30f4): Access...
  6. GhosTM@n

    Интересно iMessage - Decoding NSSharedKeyDictionary can read ObjC Object at Attacker Controlled Address

    iMessage - Decoding NSSharedKeyDictionary can read ObjC Object at Attacker Controlled Address During processing of incoming iMessages, attacker controlled data is deserialized using the NSUnarchiver API. One of the classes that is allowed to be decoded from the incoming data is NSDictionary...
  7. GhosTM@n

    Интересно XML Notepad 2.8.0.4 - XML External Entity Injection

    # Exploit Title: XML Notepad 2.8.0.4 - XML External Entity Injection # Date: 2019-11-11 # Exploit Author: 8-Team / daejinoh # Vendor Homepage: https://www.microsoft.com/ # Software Link: https://github.com/microsoft/XmlNotepad # Version: XML Notepad 2.8.0.4 # Tested on: Windows 10 Pro # CVE ...
  8. I

    Exploits (Windows)

    https://github.com/WindowsExploits/Exploits