header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows Defender VBScript Detection Mitigation Bypass for TrojanWin32Powessere.G

Windows Defender usually blocks the execution of TrojanWin32Powessere.G, but a bypass using VBScript and ActiveX engine can allow the execution of malicious commands. By adding arbitrary text as the 2nd mshtml parameter, one can bypass the detection. For example, running rundll32 vbscript:"\\..\\mshtml\\..\\PWN\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) can execute commands despite Windows Defender protection.

Windows Defender Trojan.Win32Powessere.G Mitigation Bypass

Windows Defender usually prevents the execution of TrojanWin32Powessere.G by leveraging rundll32.exe. However, by using multiple commas in the execution command, the mitigation can be bypassed, allowing successful execution of the trojan.

SISQUALWFM 7.1.319.103 Host Header Injection

A proof-of-concept scenario showcasing a host header injection vulnerability in sisqualWFM version 7.1.319.103, particularly targeting the /sisqualIdentityServer/core endpoint. Exploiting this flaw could allow an attacker to manipulate webpage links or redirect users to malicious sites by altering the host header.

Windows Defender Detection Mitigation Bypass for TrojanWin32Powessere.G

Windows Defender's mitigation bypass for TrojanWin32Powessere.G allows execution leveraging rundll32.exe. By using multi-commas, the mitigation can be bypassed, enabling successful execution.

Media Library Assistant WordPress Plugin – RCE and LFI

Media Library Assistant Wordpress Plugin in version < 3.10 is affected by an unauthenticated remote reference to Imagick() conversion which allows attacker to perform LFI and RCE depending on the Imagick configuration on the remote server. The affected page is: wp-content/plugins/media-library-assistant/includes/mla-stream-image.php

Firefox location.QueryInterface() Code Execution (Mac OS X)

This module exploits a code execution vulnerability in the Mozilla Firefox browser. To reliably exploit this vulnerability, we need to fill almost a gigabyte of memory with our nop sled and payload. This module has been tested on OS X 10.3 with the stock Firefox 1.5.0 package.

Microsoft Windows CreateWindow function callback vulnerability

A crash due to an invalid read in the Windows kernel can be reliably leveraged into privileged code execution resulting in a privilege escalation local vulnerability. This happens because special values of 'hParent' where not sufficiently taken into account when patching 'xxxCreateWindowsEx' on MS010-032.

HP OpenView NNM getnnmdata.exe CGI Invalid Hostname Remote Code Execution

The exploit allows an attacker to execute arbitrary code on a vulnerable system by sending a specially crafted request to the getnnmdata.exe CGI script. This vulnerability is due to an invalid hostname check in the script, which can be bypassed to execute arbitrary code. The vulnerability has been assigned CVE-2010-1555.

HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution

This exploit allows remote attackers to execute arbitrary code via a crafted ICount parameter in a CGI request to getnnmdata.exe. The vulnerability exists in HP OpenView Network Node Manager (NNM) and allows an attacker to execute arbitrary code with the same privileges as the NNM server.

Recent Exploits: