header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Linux Kernel <= 2.6.37 local privilege escalation

This exploit leverages three vulnerabilities to get root, all of which were discovered by Nelson Elhage: CVE-2010-4258, CVE-2010-3849 and CVE-2010-3850. CVE-2010-4258 is the interesting one, and the reason for this exploit. It allows a user to write a NULL word to an arbitrary kernel address if a thread is created via clone(2) using the CLONE_CHILD_CLEARTID flag and the kernel performs an address limit override via set_fs(KERNEL_DS). CVE-2010-3849 is a NULL pointer dereference in the Econet protocol, which is reachable via sock_no_sendpage(). CVE-2010-3850 is a missing capabilities check which allows users to assign Econet addresses to arbitrary interfaces. This exploit was specifically designed to be limited, as the particular symbols it resolves are not exported on Slackware or Debian, Red Hat does not support Econet by default and CVE-2010-3849 and CVE-2010-3850 have both been patched by Ubuntu and Debian.

MODx Revolution CMS 2.0.4-pl2 Remote XSS POST Injection Vulnerability

The MODx Revolution CMS suffers from a XSS vulnerability when parsing user input to the 'username' and 'email' parameters via POST method in login.php script at the manager login interface. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

Winzip WZFLDVW.OCX text property access violation

An access violation vulnerability exists in Winzip WZFLDVW.OCX when a specially crafted argument is passed to the Text property. This can be exploited to cause a stack-based buffer overflow via a specially crafted argument passed to the Text property.

Viscom VideoEdit Gold ActiveX 8.0 Remote Code Execution Exploit

This is a plain vanilla stack overflow exploit for Viscom VideoEdit Gold ActiveX 8.0. The exploit is a Ctrl+C Ctrl+V, herpderp exploit which uses a shellcode to execute calc.exe. The exploit is relatively low due to object not marked safe for scripting and requires the user to change the default IE settings to let it run.

Video Charge Studio <= 2.9.5.643 (.vsc) Buffer Overflow (SEH)

Video Charge Studio is prone to a buffer overflow when parsing a malicious vsc files 'Filename' value field. An attacker could trick a user into loading a specially crafted vsc file to execute arbitrary code on a users PC without there consent.

Recent Exploits: