header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Exploits for win32kfull!bFill vulnerability

Exploits for the recently-patched win32kfull!bFill vulnerability. Executing the Palette or Bitmap exploit will give you SYSTEM privileges on the affected system. The exploits should work fine on Windows 10 x64 with Creators Update, build 15063.540 (latest version of Win10 before the release of Microsoft's September Updates). The Visual Studio solution contains three exploits: CVE-2016-3309_Reloaded_Bitmaps, CVE-2016-3309_Reloaded_Palettes and CVE-2016-3309_Reloaded_Deadlock.

CSRF

Metasploit Pro, Express, Ultimate, and Community can encounter an issue of cross site request forgery (also known as one-click attack and is abbreviated as CSRF or XSRF), which is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. A CSRF attack attempts to exploit the trust that a specific website has in a user's browser. The MSF did not protect the logout form with csrf token, therefore i can logout any user by sending this url https://Metasploit-Server-IP:3790/logout. It's less damaging than a traditional 'hack back' but is sure to irritate the local red team to no end. It's essentially a user DoS.

ClipBucket PHP Script Remote Code Execution (RCE)

ClipBucket is vulnerable to Remote Code Execution (RCE) due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server.

Apache Tomcat RCE CVE-2017-12617

Apache Tomcat servers 7.0.{0 to 79} are susceptible to remote code execution. By design, you are not allowed to upload JSP files via the PUT method. This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. However, due to the insufficient checks, an attacker could gain remote code execution on Apache Tomcat servers that have enabled PUT method by using a specially crafted HTTP request.

ERS Data System 1.8.1 Deserialize Vulnerability

ERS Data System 1.8.1 allows remote attackers to execute arbitrary code, related to the use of com.branaghgroup.ecers.update.UpdateRequest deserialization. To exploit this vulnerability, an attacker can enable packet forwarding and poison DNS requests to the www.ersdata.com domain. Then, the attacker can run a request handler on the attacking machine, which will answer all requests with malicious serialized gadgets.

Multiple Stored XSS in EPESI

Multiple Stored XSS vulnerabilities exist in EPESI, a web-based business information manager. The vulnerabilities exist in the Tasks, Phonecalls, Notes, and Alerts modules. An attacker can exploit these vulnerabilities by creating a new task, phonecall, note, or alert and entering malicious JavaScript code in the title, description, or subject fields. The malicious code will be stored in the database and executed when the user views the task, phonecall, note, or alert.

Unauthenticated remote root code execution on captive portal Ucopia <= 5.1

When a user connects to Ucopia wifi guest, every request is redirected to controller.access.network. An easier to use php backdoor can be created by sending a request to controller.access.network/autoconnect_redirector.php. As php is in sudoers without password, a request can be sent to controller.access.network/upload/bd.php to execute commands with sudo privileges. An ssh key can be pushed to the server to gain root access.

Recent Exploits: