Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Monday, May 26, 2025

Day: 13 June 2020

Exploit WordPress Plugin Multi-Scheduler 1.0.0 – CSRF (Delete User) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Vulnerability Details : The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known. Full Proof of Concept (PoC) Step -1 Step -2 Step -3 Step -4 Step -5 Step -6 […]

Continue Reading

Exploit Frigate Professional 3.36.0.9 – Local Buffer Overflow (SEH) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Key Points : ✔ In this vulnerabilities frigate professional software will be crashed due to malicious code. You can Follow these steps : Run python code: FrigateLCE.py Copy content to clipboard Open “Frigate3.exe” Go to “Disk” > Find Computer Paste ClipBoard into the “Computer Name:” field Click on OK Calc.exe […]

Continue Reading

Exploit Joomla J2 Store 3.3.11 – SQL Injection (Authenticated) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Full Proof of Concept (PoC) Step -1 Step -2 Step -3 Step -4 Step -5 Done 🙂 !!

Continue Reading

Exploit HFS Http File Server 2.3m Build 300 – Buffer Overflow (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

CVE-2020-13432 Security Issue This vulnerability allows an remote attackers to trigger an invalid-pointer write access violation via concurrent HTTP requests with a long URI or long HTTP headers like Cookie, User-Agent etc. Remote unauthenticated attackers can send concurrent HTTP requests using an incrementing or specific payload range of junk characters […]

Continue Reading

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy