<?xml version="1.0" encoding="windows-1251"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
    <title>HackZone.RU - Эксплойты</title>
    <link>http://www.hackzone.ru/</link>
    <description>HackZone.RU - Территория взлома</description>
    <lastBuildDate>Mon, 12 Oct 2020 12:27:05 +0300</lastBuildDate>
    <ttl>15</ttl>
    <language>ru</language>
<item>
 <title><![CDATA[ZeroLogon exploit]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9938/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9938/</guid>
 <pubDate>Mon, 12 Oct 2020 12:27:00 +0300</pubDate>
 <description><![CDATA[Exploit code based on  https://www.secura.com/blog/zero-logon  and  https://github.com/SecuraBV/CVE-2020-1472 . Original research and scanner by Secura, modifications by RiskSense Inc.  
 To exploit, clear out any previous Impacket installs you have and in...]]></description>
</item>
<item>
 <title><![CDATA[D-Link DSR-250N 3.12 - Denial of Service (PoC)]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9936/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9936/</guid>
 <pubDate>Mon, 12 Oct 2020 11:33:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: D-Link DSR-250N 3.12 - Denial of Service (PoC)
# Google Dork: N/A
# Author: RedTeam Pentesting GmbH
# Date: 2020-10-03
# Exploit Author: Kiko Andreu (kikoas1995) & Daniel Monz&#243;n (stark0de)
# Vendor Homepage: https://www.dlink.com
# So...]]></description>
</item>
<item>
 <title><![CDATA[Microsoft SQL Server Reporting Services 2016 - Remote Code Execut...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9911/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9911/</guid>
 <pubDate>Sat, 03 Oct 2020 07:04:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: Microsoft SQL Server Reporting Services 2016 - Remote Code Execution
# Google Dork: inurl:ReportViewer.aspx
# Date: 2020-09-17
# Exploit Author: West Shepherd
# Vendor Homepage: https://www.microsoft.com
# Version: Microsoft SQL Server 201...]]></description>
</item>
<item>
 <title><![CDATA[Simple Online Food Ordering System 1.0 - 'id' SQL Injection (Unau...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9910/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9910/</guid>
 <pubDate>Sat, 03 Oct 2020 07:03:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: Simple Online Food Ordering System 1.0 - 'id' SQL Injection (Unauthenticated)
# Google Dork: N/A
# Date: 2020-09-22
# Exploit Author: Eren 'Aporlorxl23' &#350;im&#351;ek
# Vendor Homepage: https://www.sourcecodester.com/php/14460/simple-on...]]></description>
</item>
<item>
 <title><![CDATA[WebsiteBaker 2.12.2 - 'display_name' SQL Injection (authenticated...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9909/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9909/</guid>
 <pubDate>Sat, 03 Oct 2020 07:02:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: WebsiteBaker 2.12.2 - 'display_name' SQL Injection (authenticated)
# Google Dork: -
# Date: 2020-09-20
# Exploit Author: Roel van Beurden
# Vendor Homepage:  https://websitebaker.org
# Software Link: https://wiki.websitebaker.org/doku.php/...]]></description>
</item>
<item>
 <title><![CDATA[Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMP...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9892/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9892/</guid>
 <pubDate>Sun, 05 Apr 2020 11:45:00 +0300</pubDate>
 <description><![CDATA[# CVE-2020-0796
Windows SMBv3 LPE Exploit
![exploit](https://user-images.githubusercontent.com/1675387/77913732-110d4f80-7295-11ea-9af6-f17201c66673.gif)
## Authors
  * Daniel Garc&#237;a Guti&#233;rrez ([@danigargu](https://twitter.com/danigargu))
  * Man...]]></description>
</item>
<item>
 <title><![CDATA[rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Ex...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9887/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9887/</guid>
 <pubDate>Sat, 28 Mar 2020 08:41:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution
# Exploit Author: vikingfr
# Greetz : Orange Cyberdefense - team CSR-SO (https://cyberdefense.orange.com)
# Date: 2020-03-12
# CVE-2019-19509 + CVE-2019-19585 + CVE-2...]]></description>
</item>
<item>
 <title><![CDATA[Broadcom Wi-Fi Devices - 'KR00K Information Disclosure]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9876/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9876/</guid>
 <pubDate>Wed, 25 Mar 2020 08:04:00 +0300</pubDate>
 <description><![CDATA[# Kr00ker
#
# Experimetal KR00K PoC in python3 using scapy
#
# Description:
# This script is a simple experiment to exploit the KR00K vulnerability (CVE-2019-15126), 
# that allows to decrypt some WPA2 CCMP data in vulnerable devices.
# More specifically t...]]></description>
</item>
<item>
 <title><![CDATA[Google Chrome 80.0.3987.87 - Heap-Corruption Remote Denial of Ser...]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9875/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9875/</guid>
 <pubDate>Wed, 25 Mar 2020 08:03:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: Google Chrome 80.0.3987.87 - Heap-Corruption Remote Denial of Service (PoC)
# Google Dork: N/A
# Date: 2020-02-21
# Exploit Author: Cem Onat Karagun of Diesec GmBH
# Vendor Homepage: https://www.google.com/
# Version: Google Chrome 80.0.39...]]></description>
</item>
<item>
 <title><![CDATA[Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection]]></title>
 <link>http://www.hackzone.ru/exploit/view/id/9874/</link>
 <guid>http://www.hackzone.ru/exploit/view/id/9874/</guid>
 <pubDate>Wed, 25 Mar 2020 08:01:00 +0300</pubDate>
 <description><![CDATA[# Exploit Title: Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection
# Dork: inurl:&#34;index.php?option=com_hdwplayer&#34;
# Date: 2020-03-23
# Exploit Author: qw3rTyTy
# Vendor Homepage: https://www.hdwplayer.com/
# Software Link: https://www.hdwplayer.com/do...]]></description>
</item>

</channel>
</rss>
