header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation

The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take s

PineApp Mail-SeCure ldapsyncnow.php Arbitrary Command Execution

This module exploits a command injection vulnerability on PineApp Mail-SeCure 3.70. The vulnerability exists on the ldapsyncnow.php component, due to the insecure usage of the shell_exec() php function. This module has been tested successfully on PineApp Mail-SeCure 3.70.

Arbitrary File Overwrite in Wimpy MP3

The Wimpy MP3 application is vulnerable to an arbitrary file overwrite weakness. An attacker can exploit this vulnerability by providing malicious data through the 'trackFile' parameter in the 'wimpy_trackplays.php' script. This can lead to the overwrite of a text file with attacker-supplied content. Successful exploitation of this vulnerability can assist an attacker in further attacks.

WinZip32 MIME Parsing Overflow

This is a proof-of-concept exploit for the WinZip32 MIME Parsing Overflow bug. The exploit takes advantage of a buffer overflow vulnerability in WinZip 8.1 on Windows XP SP1 and Windows 2000 SP1. The exploit allows an attacker to control the EBX register and execute arbitrary code.

TRENDnet TEW-812DRU CSRF – Command Injection > Shell Exploit

This exploit allows an attacker to perform command injection and execute arbitrary commands on the TRENDnet TEW-812DRU router. The vulnerability was discovered by Jacob Holcomb and Kedy Liu, security analysts at Independent Security Evaluators. The CSRF vulnerability is identified as CVE-2013-3098 and the multiple command injection vulnerability is identified as CVE-2013-3365. The exploit involves enabling port forwarding to the router's internal IP on port 23 and enabling telnet.

Recent Exploits: