co

Linux/x86 Execve() Alphanumeric Shellcode

66 bytes small Linux/x86 Execve() alphanumeric shellcode.




co

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.




co

Windows/x86 Dynamic Bind Shell / Null-Free Shellcode

571 bytes small Microsoft Windows x86 dynamic bind shell and null-free shellcode.




co

Dynamic Null-Free PopCalc Shellcode

223 bytes small dynamic, null-free popcalc shellcode.




co

Windows/x86 Null Free WinExec Calc.exe Shellcode

195 bytes small Windows/x86 null-free WinExec Calc.exe shellcode.




co

Google Chrome 80 JSCreate Side-Effect Type Confusion

This Metasploit module exploits an issue in Google Chrome version 80.0.3987.87 (64 bit). The exploit corrupts the length of a float array (float_rel), which can then be used for out of bounds read and write on adjacent memory. The relative read and write is then used to modify a UInt64Array (uint64_aarw) which is used for read and writing from absolute memory. The exploit then uses WebAssembly in order to allocate a region of RWX memory, which is then replaced with the payload shellcode. The payload is executed within the sandboxed renderer process, so the browser must be run with the --no-sandbox option for the payload to work correctly.




co

Dynamic MessageBoxA||W PEB And Import Table Method Shellcode

232 bytes small Dynamic MessageBoxA||W PEB and Import Table Method shellcode.




co

WinExec Add-Admin Dynamic Null-Free Shellcode

210 bytes small WinExec add-admin dynamic null-free shellcode.




co

Linux/x86 Reboot Polymorphic Shellcode

26 bytes small Linux/x86 reboot polymorphic shellcode.




co

Linux/x86 Egghunter / Null-Free Shellcode

33 bytes small Linux/x86 egghunter null-free shellcode.




co

Linux/x64_86 Egghunter Execve Shellcode

63 bytes small Linux/x64_86 dynamic egghunter shellcode that searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. The payload is an execve(/bin/bash) shellcode.




co

Linux Password Protected Bindshell Shellcode

272 bytes small Linux/x86_64 null free password protected bindshell shellcode.




co

Linux/x64_86 ROL Encoded Execve Shellcode

57 bytes small Linux/x64_86 /bin/bash shellcode. The stub decodes the ROL Encoded shellcode. When the stub has finished decoding the payload, execution control is passed to the payload.




co

Linux/x86 Egghunter Shellcode

39 bytes small Linux/x86 egghunter null-free shellcode. The egghunter dynamically searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs.







co

Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts






co

Google Launches Coronavirus Website In The United States




co

Google Data Shines Light On Whether Coronavirus Lockdowns Worldwide Are Working





co

Citrix Application Delivery Controller / Gateway Remote Code Execution / Traversal

Citrix Application Delivery Controller and Citrix Gateway directory traversal remote code execution exploit.




co

Lotus Core CMS 1.0.1 Local File Inclusion

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.




co

SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion

SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks.




co

QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation

QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code.







co

PhreeBooks ERP 5.2.5 Remote Command Execution

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.




co

Kentico CMS 12.0.14 Remote Command Execution

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.




co

UPLoad 7.0 Insecure Cookie Handling

UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.




co

Ac4p.com Gallery 1.0 Cross Site Scripting / Shell Upload / Bypass / Disclosure

Ac4p.com Gallery version 1.0 suffers from cross site scripting, phpinfo disclosure, shell upload, and insecure cookie handling vulnerabilities.




co

Newbie CMS Insecure Cookie Handling

Newbie CMS suffers from an insecure cookie handling vulnerability.




co

CuteNews 1.4.6 Insecure Cookie Handling

CuteNews version 1.4.6 suffers from an insecure cookie handling vulnerability.




co

Islamic Voice Insecure Cookie Handling

Islamic Voice suffers from an insecure cookie handling vulnerability.




co

Denapars Shop Script Bypass / Insecure Cookie / Shell Upload

Denapars Shop Script suffers from administrative bypass, shell upload, and insecure cookie handling vulnerabilities.




co

velBox 1.2 Insecure Cookie Handling

velBox version 1.2 suffers from an insecure cookie handling vulnerability.




co

Memorial Web Site Script Password Reset / Insecure Cookie

Memorial Web Site Script suffers from password reset and insecure cookie handling vulnerabilities.




co

[whem]-UPLoad 7.0 Insecure Cookie

[whem]-UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.




co

My Book Insecure Cookie Handling

My Book suffers from an insecure cookie handling vulnerability.




co

AV Arcade 3 Insecure Cookie / SQL Injection

AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities.




co

Open Cart 0.6.5 Insecure Cookie

Open Cart version 0.6.5 suffers from an insecure cookie handling vulnerability.




co

Tornado 1.0 Insecure Cookie

Tornado version 1.0 suffers from an insecure cookie vulnerability.




co

Aleza Portal 1.6 Insecure Cookie

Aleza Portal version 1.6 suffers from an insecure cookie handling vulnerability that allows for SQL injection.




co

xWeblog 2.2 Insecure Cookie Handling

xWeblog version 2.2 suffers from an insecure cookie handling vulnerability.




co

PHP Hosting Directory 2.0 Insecure Cookie

PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass.




co

WikiWebHelp 0.3.3 Insecure Cookie Handling

WikiWebHelp version 0.3.3 suffers from an insecure cookie handling vulnerability.




co

Babil CMS Insecure Cookie Handling

Babil CMS suffers from an insecure cookie handling vulnerability.