krhackapt님의 최근 콘텐츠

  1. K

    PyroCMS v3.0.1 - 저장된 XSS

    # Exploit Title: PyroCMS v3.0.1 - Stored XSS # Date: 2023-11-25 # Exploit Author: tmrswrr # Category : Webapps # Vendor Homepage: https://pyrocms.com/ # Version: v3.0.1 # Tested on: https://www.softaculous.com/apps/cms/PyroCMS...
  2. K

    Akaunting 3.1.8 - 서버 측 템플릿 주입(SSTI)

    # Exploit Title: Akaunting 3.1.8 - Server-Side Template Injection (SSTI) # Exploit Author: tmrswrr # Date: 30/05/2024 # Vendor: https://akaunting.com/forum # Software Link: https://akaunting.com/apps/crm # Vulnerable Version(s): 3.1.8 # Tested : https://www.softaculous.com/apps/erp/Akaunting 1...
  3. K

    FreePBX 16 - 원격 코드 실행(RCE)(인증됨)

    # Exploit Title: FreePBX 16 - Remote Code Execution (RCE) (Authenticated) # Exploit Author: Cold z3ro # Date: 6/1/2024 # Tested on: 14,15,16 # Vendor: https://www.freepbx.org/ <?php /// /// FREEPBX [14,15,16] API Module Authenticated RCE /// Orginal Difcon ||...
  4. K

    WBCE CMS v1.6.2 - 원격 코드 실행(RCE)

    # Exploit Title: WBCE CMS v1.6.2 - Remote Code Execution (RCE) # Date: 3/5/2024 # Exploit Author: Ahmet Ümit BAYRAM # Vendor Homepage: https://wbce-cms.org/ # Software Link: https://github.com/WBCE/WBCE_CMS/archive/refs/tags/1.6.2.zip # Version: 1.6.2 # Tested on: MacOS import requests from bs4...
  5. K

    appRain CMF 4.0.5 - 원격 코드 실행(RCE)(인증됨)

    # Exploit Title: appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated) # Date: 04/28/2024 # Exploit Author: Ahmet Ümit BAYRAM # Vendor Homepage: https://www.apprain.org # Software Link: https://github.com/apprain/apprain/archive/refs/tags/v4.0.5.zip # Version: latest # Tested on: MacOS...
  6. K

    PHP < 8.3.8 - 원격 코드 실행(인증되지 않음)(Windows)

    # Exploit Title: PHP Windows Remote Code Execution (Unauthenticated) # Exploit Author: Yesith Alvarez # Vendor Homepage: https://www.php.net/downloads.php # Version: PHP 8.3,* < 8.3.8, 8.2.*<8.2.20, 8.1.*, 8.1.29 # CVE : CVE-2024-4577 from requests import Request, Session import sys import...
  7. K

    Boelter Blue System Management 1.3 - SQL 주입

    # Exploit Title: SQL Injection Vulnerability in Boelter Blue System Management (version 1.3) # Google Dork: inurl:"Powered by Boelter Blue" # Date: 2024-06-04 # Exploit Author: CBKB (DeadlyData, R4d1x) # Vendor Homepage: https://www.boelterblue.com # Software Link...
  8. K

    가금류 농장 관리 시스템 v1.0 - 원격 코드 실행(RCE)

    # Exploit Title: Poultry Farm Management System v1.0 - Remote Code Execution (RCE) # Date: 24-06-2024 # CVE: N/A (Awaiting ID to be assigned) # Exploit Author: Jerry Thomas (w3bn00b3r) # Vendor Homepage: https://www.sourcecodester.com/php/15230/poultry-farm-management-system-free-download.html #...
  9. K

    Automad 2.0.0-alpha.4 - 저장된 크로스 사이트 스크립팅(XSS)

    # Exploit Title: Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS) # Date: 20-06-2024 # Exploit Author: Jerry Thomas (w3bn00b3r) # Vendor Homepage: https://automad.org # Software Link: https://github.com/marcantondahmen/automad # Category: Web Application [Flat File CMS] # Version...
  10. K

    Azon Dominator 제휴 마케팅 스크립트 - SQL 주입

    # Exploit Title: Azon Dominator - Affiliate Marketing Script - SQL Injection # Date: 2024-06-03 # Exploit Author: Buğra Enis Dönmez # Vendor: https://www.codester.com/items/12775/azon-dominator-affiliate-marketing-script # Demo Site: https://azon-dominator.webister.net/ # Tested on: Arch Linux #...
  11. K

    Xhibiter NFT Marketplace 1.10.2 - SQL 주입

    # Exploit Title: xhibiter nft marketplace SQLI # Google Dork: intitle:"View - Browse, create, buy, sell, and auction NFTs" # Date: 29/06/204 # Exploit Author: Sohel yousef - https://www.linkedin.com/in/sohel-yousef-50a905189/ # Vendor Homepage...
  12. K

    SolarWinds Kiwi Syslog Server 9.6.7.1 - 인용되지 않은 서비스 경로

    # Exploit Title: SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path # Date: 2024-07-31 # Exploit Author: Milad Karimi (Ex3ptionaL) # Contact: [email protected] # Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL # MiRROR-H: https://mirror-h.org/search/hacker/49626/ # Vendor...
  13. K

    Devika v1 - 'snapshot_path'를 통한 경로 탐색

    # Exploit Title: Devika v1 - Path Traversal via 'snapshot_path' Parameter # Google Dork: N/A # Date: 2024-06-29 # Exploit Author: Alperen Ergel # Contact: @alpernae (IG/X) # Vendor Homepage: https://devikaai.co/ # Software Link: https://github.com/stitionai/devika # Version: v1 # Tested on...
  14. K

    Calibre-web 0.6.21 - 저장된 XSS

    # Exploit Title: Stored XSS in Calibre-web # Date: 07/05/2024 # Exploit Authors: Pentest-Tools.com (Catalin Iovita & Alexandru Postolache) # Vendor Homepage: (https://github.com/janeczku/calibre-web/) # Version: 0.6.21 - Romesa # Tested on: Linux 5.15.0-107, Python 3.10.12, lxml 4.9.4 # CVE...
  15. K

    드론 해킹 테스트 도구 젠장 취약한 드론

    Damn Vulnerable Drone은 인기 있는 ArduPilot/MAVLink 아키텍처를 기반으로 하는 의도적으로 취약한 드론 해킹 시뮬레이터로, 실제 드론 해킹을 위한 현실적인 환경을 제공합니다. Damn Vulnerable Drone은 공격적인 보안 전문가가 드론 해킹 기술을 안전하게 배우고 연습할 수 있도록 설계된 가상 시뮬레이션 환경입니다. 실제 ArduPilot 및 MAVLink 드론 아키텍처와 취약점을 시뮬레이션하여 드론 시스템 활용에 대한 실무 경험을 제공합니다. Damn Vulnerable...
뒤로
상단