header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ManageEngine EventLog Analyzer Version 10.0 Cross Site Request Forgery Exploit

This exploit allows an attacker to add a new administrator user to the ManageEngine EventLog Analyzer Version 10.0. The attacker can craft a malicious HTML page with a form that contains hidden fields with values that will be used to add a new administrator user. When the victim visits the malicious page, the form will be automatically submitted and the new administrator user will be added.

OYO File Manager 1.1 iOS&Android – Multiple Vulnerabilities

A local file include web vulnerability has been discovered in the official OYO File Manager v1.1 iOS & Android mobile web-application. The file include vulnerability allows remote attackers to unauthorized include local file/path requests to compromise the mobile web-application.

IO Port Access Vulnerability

This vulnerability allows an attacker to gain access to the I/O ports of a system, which can be used to gain access to privileged information or to execute malicious code. The vulnerability is caused by the use of the iopl() function in the code, which allows an attacker to gain access to the I/O ports of a system. The code also contains a loop that can be used to push data into the FIFO register, which can be used to gain access to privileged information or to execute malicious code.

NtOpenFile Struct Local Privilege Escalation

This exploit is a local privilege escalation vulnerability in the NtOpenFile Struct function in Windows. It allows an attacker to gain SYSTEM privileges by sending a malicious IOCTL to the CNG device. This vulnerability was discovered by NTarakanov and was assigned CVE-2015-0057.

Openlitespeed 1.3.9 Use After Free denial of service exploit

This exploit triggers a denial of service condition within the Openlitespeed web server. This is achieved by sending a tampered request contain a large number (91) of 'a: a' header rows. By looping this request, a memmove call within the HttpReq class is triggered with a freed pointer, resulting in a reference to an invalid memory location and thus a segmentation fault.

Win32k LPE vulnerability used in APT attack

This exploit is a proof-of-concept code for a local privilege escalation vulnerability in the Windows kernel. It was discovered by FireEye researchers and used in an APT attack. The exploit is based on a race condition in the win32k.sys system call NtUserSetWindowLongPtr() which can be abused to gain SYSTEM privileges.

SixApart MovableType Storable Perl Code Execution

This module exploits a serialization flaw in MovableType before 5.2.12 to execute arbitrary code. The default nondestructive mode depends on the target server having the Object::MultiType and DateTime Perl modules installed in Perl's @INC paths. The destructive mode of operation uses only required MovableType dependencies, but it will noticeably corrupt the MovableType installation.

Recent Exploits: