header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HP Operations Agent Opcode coda.exe 0x34 Buffer Overflow

This module exploits a buffer overflow vulnerability in HP Operations Agent for Windows. The vulnerability exists in the HP Software Performance Core Program component (coda.exe) when parsing requests for the 0x34 opcode. This module has been tested successfully on HP Operations Agent 11.00 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass). The coda.exe components runs only for localhost by default, network access must be granted through its configuration to be remotely exploitable. On the other hand it runs on a random TCP port, to make easier reconnaissance a check function is provided.

HP Operations Agent Opcode coda.exe 0x8c Buffer Overflow

This module exploits a buffer overflow vulnerability in HP Operations Agent for Windows. The vulnerability exists in the HP Software Performance Core Program component (coda.exe) when parsing requests for the 0x8c opcode. This module has been tested successfully on HP Operations Agent 11.00 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass). The coda.exe components runs only for localhost by default, network access must be granted through its configuration to be remotely exploitable. On the other hand it runs on a random TCP port, to make easier reconnaissance a check function is provided.

ManageEngine Security Manager Plus 5.5 build 5505 SQL Injection

This module exploits a SQL injection found in ManageEngine Security Manager Plus advanced search page, which results in remote code execution under the context of SYSTEM in Windows; or as the user in Linux. Authentication is not required in order to exploit this vulnerability.

Microsoft Windows Help program(WinHlp32.exe)memory corruption

The HLP file is Microsoft Help file documentation for the Windows operating system or Windows programs. Memory corruption during the handling of the hlp files by Microsoft Windows default help viewer (WinHlp32.exe) Successful exploits can allow attackers to execute arbitrary code.

WordPress Easy Webinar Plugin Blind SQL Injection Vulnerability

The Wordpress Easy Webinar Plugin is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'wid' in the 'get-widget.php' file. The HTTP response will read 404, but this is false. An example of a malicious SQL query is '3' or 'x'='x', which will result in the page loading correctly and show that the plugin is vulnerable to injection (string).

Aladdin Knowledge System Ltd. PrivAgent ActiveX Control 2.0 Multiple Remote Vulnerabilities

PrivAgent ActiveX Control 2.0 is vulnerable to a buffer overflow vulnerability when handling a specially crafted argument passed to the "SetUserName" method. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.

Trustwave SpiderLabs Security Advisory TWSL2012-016: Multiple Vulnerabilities in Bitweaver

The 'overlay_type' parameter in the 'gmap/view_overlay.php' page in Bitweaver is vulnerable to a local file inclusion vulnerability. This vulnerability can be demonstrated by traversing to a known readable path on the web server file system. Multiple cross-site scripting (XSS) vulnerabilities have been discovered that allow remote unauthenticated users to run arbitrary scripts on the system.

Recent Exploits: