header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Barracuda Networks #35 Web Firewall 610 v6.0.1 – Filter Bypass & Persistent Vulnerability

Multiple persistent input validation web vulnerabilities and a filter bypass issue has been discovered in the Barracuda Networks WebFilter 610-Vx appliance web-application. The vulnerability allows remote attackers to bypass the security filter protection to inject malicious persistent script codes on the application-side (persistent). The persistent input validation web vulnerability is located in the `username` and `password` value of the `/cgi-mod/index.cgi` module. Remote attackers are able to inject own malicious persistent script codes to the vulnerable `username` and `password` value of the `/cgi-mod/index.cgi` module.

CVE-2014-4699 ptrace/sysret PoC

This code is kernel specific. On Ubuntu 12.04.0 LTS (3.2.0-23-generic), the following will trigger the #GP in sysret and overwrite the #PF handler so we can land to our NOP sled mapped at 0x80000000. However, once landed, the IDT will be trashed. We can either attempt to restore it (then escalate privileges and execute our shellcode) or find something else to overwrite that would transfer exec flow to our controlled user-space address. Since 3.10.something, IDT is read-only anyway.

Race Condition between Updating httpd’s “scoreboard” and mod_status

A race condition exists between updating httpd's "scoreboard" and mod_status, leading to several critical scenarios like heap buffer overflow with user supplied payload and leaking heap which can leak critical memory containing htaccess credentials, ssl certificates private keys and so on.

Remote Code Execution and Arbitrary File Read in IBM 1754 GCM Family

Improperly sanitized input may allow a remote authenticated attacker to perform remote code execution on the GCM KVM switch. This device also allows any authenticated user to read arbitrary files. Files can be anywhere on the target.

Microsoft XP SP3 BthPan.sys Arbitrary Write Privilege Escalation

A vulnerability within the BthPan module allows an attacker to inject memory they control into an arbitrary location they define. This can be used by an attacker to overwrite HalDispatchTable+0x4 and execute arbitrary code by subsequently calling NtQueryIntervalProfile.

Raritan PowerIQ suffers from an unauthenticated SQL injection vulnerability

Raritan PowerIQ suffers from an unauthenticated SQL injection vulnerability within an endpoint used during initial configuration of the licensing for the product. This endpoint is still available after the appliance has been fully configured. Both the 'sort' and 'dir' parameters are vulnerable. sqlmap identified the following injection points with a total of 1173 HTTP(s) requests.

World Of Warcraft 3.3.5a Stack Overflow (macros-cache.txt)

A stack overflow vulnerability exists in World of Warcraft 3.3.5a, which allows an attacker to execute arbitrary code by creating a malicious macros-cache.txt file in the WTF/Account/[AccountName] directory. The attacker can then use this file to execute arbitrary code on the target system.

WordPress wpbackupplus Database and files Backup download (0-day)

wpbackupplus make the backup .zip files and not protected. For download all the website files, the attacker can use the URL http://[SITE]/[PATH]/wp-content/uploads/wp-backup-plus/. For download the Database backup, the attacker can use the URL http://[SITE]/[PATH]/wp-content/uploads/wp-backup-plus/temp. The POC is http://[SERVER]/wp-content/uploads/wp-backup-plus/temp/[DATABASE_NAME]_[DATE].sql.

Microsoft XP SP3 MQAC.sys Arbitrary Write Privilege Escalation

A vulnerability within the MQAC module allows an attacker to inject memory they control into an arbitrary location they define. This can be used by an attacker to overwrite HalDispatchTable+0x4 and execute arbitrary code by subsequently calling NtQueryIntervalProfile.

Recent Exploits: