Atlassian Jira 8.15.0 Username Enumeration
Atlassian Jira version 8.15.0 suffers from a username enumeration vulnerability.
MD5 |…
CHIYU IoT Cross Site Scripting
# Exploit Title: CHIYU IoT devices - 'Multiple' Cross-Site Scripting (XSS)# Date: May 31 2021# Exploit Author:…
magicRecon – A Powerful Shell Script To Maximize The Recon And Data…
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and…
Bucky – An Automatic S3 Bucket Discovery Tool
Bucky is an automatic tool designed to discover S3 bucket misconfiguration, Bucky consists up of two modules…
Your Amazon Gadgets to Mechanically Share Your Wi-Fi With Neighbors
Beginning June 8, Amazon will robotically allow a characteristic on its household of {hardware} units,…
Can easily Your Business Email Be Spoofed? Check Your Domain Security Right now!
Are you aware about how secure your site is? In most organizations, they have an assumption that their…
Your Amazon Units to Mechanically Share Your Wi-Fi With Neighbors
Beginning June 8, Amazon will mechanically allow a characteristic in your Alexa, Echo, or different Amazon…
Could Your Business Email Be Spoofed? Check Your Domain Security At this point!
Are you aware about how secure your domain name is? In most organizations, they have an assumption that their…
Backdoor.Win32.WinShell.a Code Execution – Geekychild
Backdoor.Win32.WinShell.a malware suffers from a code execution vulnerability.
MD5 |…
Ubuntu OverlayFS Local Privilege Escalation
The document in this archive illustrates using the included proof of concept exploit to achieve root on…