Real Name | Alexandre ZANNI |
---|---|
Email address | private |
First Active | 2019-07-19 |
Last Active | 2023-03-24 |
Joomla! versions prior to 4.2.8 suffer from an unauthenticated information disclosure vulnerability.
417f9d6c26b8a1e0793bc9e5aaf8fe1808d869eb6f3e3c535d5813d71577788d
iTop versions prior to 2.7.5 authenticated remote command execution exploit.
a0b99a6ffb1e72f424f072c032f45fd3c9811762bc3e6fd6ab9132aafab59e6c
Easy!Appointments versions prior to 1.4.3 suffers from an unauthenticated PII disclosure vulnerability.
1da2f1556f091a16878c1f5ff43c96ee13603b821be2cf36f4eddc3bdda3b756
OpenEMR version 5.0.1.3 authenticated remote shell upload exploit that leverages a vulnerability discovered in 2018.
c870808a4f9a9a137fcb679a6a3037401a0616eb79f037981dc723adf1f8b701
OpenEMR version 5.0.17 path traversal exploit.
d922d48e6a0bee902e565673aa1c4471cc5327d78c48154ce121df3691d4e7ac
This ruby script is a 4-in-1 exploit that leverages shell upload, bypass, and information disclosure vulnerabilities in Monitorr version 1.7.6m.
4e0943b39fe8d3aa212ab05eca89a795f48e2fb9a93af0d03270d8b8be76b4de
OpenNetAdmin versions 8.5.14 through 18.1.1 remote command execution exploit written in Ruby. This exploit was based on the original discovery of the issue by mattpascoe.
b82e6c61d40806f2604b1313677e7f7e64221c2886c94d83d210370a8aca9611
CMSUno version 1.6.2 authenticated remote code execution exploit. The original discovery for the vulnerability leveraged is attributed to Fatih Celik in November of 2020.
2477146e721d33c19e7c9e103dfd83b0cfc4343413f007eb0260e88e64259065
Fuel CMS version 1.4 suffers from a remote code execution vulnerability.
291fe5bb50db9c427fe22ed5bc2893e3d0b8edcccce7f8c12d6f4f5035056f37
Bludit version 3.9.2 suffer from an authentication bruteforce mitigation bypass vulnerability.
87cea634a93b6826dcf3d595856b2558aa443aa641240735859083ddbc23b850
Umbraco CMS version 7.12.4 authenticated remote code execution exploit.
4803c0e0fa7c2b8b46513e0c18ccdda2e3ef0f8a6e89f50277c62186110ffe4e
OpenEMR versions 5.0.1 and below authenticated remote code execution exploit written in ruby.
7f48877b7731f082b5433de3e5ae805d4a0f4a8de62daf8987025281c09c42ae
Atmail Email Server Appliance version 6.4 exploit toolchain that leverages cross site scripting and cross site request forgery to achieve code execution.
94c1dd5802aaefb4d1b163864dccf7213ba1a4e93f31e08474f4fd1c46586d41
Alfresco version 5.2.4 suffers from multiple persistent cross site scripting vulnerabilities.
e8b6bf3c9d0342e4295b21ad9cf44c5ed78bd87235425b6da9f85a1f54a77b2f
REDCap versions prior to 9.1.2 suffer from a cross site scripting vulnerability.
d2e6506288ad691c7d35d2ee8deb7084ec20344a1b0c6d6abc48f0d2eb2668c1