header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Yokogawa CENTUM CS 3000 BKHOdeq.exe Buffer Overflow

This module exploits a stack based buffer overflow in Yokogawa CENTUM CS 3000. The vulnerability exists in the service BKHOdeq.exe when handling specially crafted packets. This module has been tested successfully on Yokogawa CENTUM CS 3000 R3.08.50 over Windows XP SP3 and Windows 2003 SP2.

Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities

Multiple memory corruption vulnerabilities have been found in the code that implements 3D Acceleration for OpenGL graphics in Oracle VirtualBox. These vulnerabilities could allow an attacker who is already running code within a Guest OS to escape from the virtual machine and execute arbitrary code on the Host OS.

Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Users' group, for the 'eMservice.exe' binary file. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges.

HP Data Protector Backup Client Service Remote Code Execution

This module abuses the Backup Client Service (OmniInet.exe) to achieve remote code execution. The vulnerability exists in the EXEC_BAR operation, which allows to execute arbitrary processes. This module has been tested successfully on HP Data Protector 6.20 on Windows 2003 SP2 and Windows 2008 R2.

SolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write

This module exploits a remote arbitrary file write vulnerability in SolidWorks Workgroup PDM 2014 SP2 and prior. For targets running Windows Vista or newer the payload is written to the startup folder for all users and executed upon next user logon. For targets before Windows Vista code execution can be achieved by first uploading the payload as an exe file, and then upload another mof file, which schedules WMI to execute the uploaded payload. This module has been tested successfully on SolidWorks Workgroup PDM 2011 SP0 on Windows XP SP3 (EN) and Windows 7 SP1 (EN).

Remote Code Execution in ownCloud

A remote code execution has been found and confirmed within ownCloud as an authenticated user. A successful attack could allow an authenticated attacker to execute PHP code, which could lead to a full compromise of the server and associated infrastructure. Please note that only the Windows versions of ownCloud are affected and that valid credentials are required. It is possible to create a custom .htaccess into the user's folder on Windows version of the application, which will enable PHP execution on the folder. This vulnerability exists because it is possible to bypass the internal blacklists using Windows ADS (Alternate Data Streams).

Unauthenticated access & manipulation of settings

The Huawei E5331 MiFi mobile hotspot is vulnerable to unauthenticated access and manipulation of settings. The device is accessible via the web interface without authentication. The following settings can be manipulated: WLAN settings, WAN settings, Firewall settings, System settings.

iCAM Workstation Control Software Local Authentication Bypass

There is a simple local exploit in iCAM workstation control which allows a user to bypass the login screen and access the Local Disk Drive to launch applications such as a Web Browser. To exploit this vulnerability, the attacker must press the Alt & Tab hotkey from the login screen, then press the shortcut for the Windows Help feature - Windows key & F1. Once in the windows help, the attacker must type in a random string into the search box and press enter, which will open the windows explorer. From there, the attacker can launch various applications by navigating the windows file system.

Recent Exploits: