Peter Gabaldon

6 exploits Active since Feb 2024
CVE-2024-7481 GITHUB HIGH c++ WORKING POC
TeamViewer <15.58.4 - Privilege Escalation
Improper verification of cryptographic signature during installation of a Printer driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.
136 stars
CVSS 8.8
CVE-2024-7479 NOMISEC HIGH WORKING POC
TeamViewer <15.58.4 - Privilege Escalation
Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.
136 stars
CVSS 8.8
CVE-2024-1346 NOMISEC MEDIUM WORKING POC
LaborOfficeFree <19.10 - Info Disclosure
Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
2 stars
CVSS 6.8
CVE-2025-40677 NOMISEC HIGH WORKING POC
Summar Software's Portal del Empleado - SQL Injection
SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.
1 stars
EIP-2026-117396 EXPLOITDB python WORKING POC
LaborOfficeFree 19.10 - MySQL Root Password Calculator
CVE-2025-40677 EXPLOITDB HIGH text WORKING POC
Summar Software's Portal del Empleado - SQL Injection
SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.