header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Atomic Alarm Clock x86 6.3 – ‘AtomicAlarmClock’ Unquoted Service Path

The Atomic Alarm Clock service 'timeserv.exe' will load an arbitrary EXE and execute it with SYSTEM integrity. This security misconfiguration by the vendor can be exploited locally or as part of an attack chain. By placing a file named 'Program.exe' on the root drive, an attacker can obtain persistent arbitrary code execution. Under normal environmental conditions, this exploit ensures escalation of privileges from Admin to SYSTEM.

Prestashop <= 1.7.6.4 single-click RCE exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable Prestashop version 1.7.6.4 and below. The exploit works by sending a malicious SVG file to the target server, which is then processed by the server and executes the code contained in the SVG file. The code in the SVG file contains a malicious URL which is used to import a malicious theme file, which can then be used to execute arbitrary code on the target server.

Centreon 19.10.5 – ‘id’ SQL Injection

The analysis discovered a time-based blind SQL injection vulnerability in the tracker functionality of Centreon Monitoring software. A malicious user can inject arbitrary SQL commands to the application. The vulnerability lies in the project tracker service search functionality; depending on project visibility successful exploitation may require user authentication. A successful attack can read, modify or delete data from the database or execute arbitrary commands on the underlying system.

Code Blocks 16.01 – Buffer Overflow (SEH) UNICODE

Code Blocks 16.01 is vulnerable to a buffer overflow vulnerability when a specially crafted .m3u file is opened. This vulnerability can be exploited to execute arbitrary code by overwriting the SEH handler with a malicious payload. The vulnerability is triggered when a specially crafted .m3u file is opened, which contains a buffer of 536 bytes followed by a POPAD + Aligned and POP/POP/RET instructions. The malicious payload is then placed after the POP/POP/RET instructions and is executed when the SEH handler is overwritten.

Nexus Repository Manager Java EL Injection RCE

This module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. This is a post-authentication vulnerability, so credentials are required to exploit the bug. Any user regardless of privilege level may be used.

TAO Open Source Assessment Platform 3.3.0 RC02 – HTML Injection

Multiple cross site vulnerabilities have been discovered in the TAO Open Source Assessment Platform v3.3.0 RC02. The vulnerabilities allow remote attackers to inject malicious script codes on the application-side (persistent) of the vulnerable service module. The vulnerability is located in the `name` and `description` value of the `create` module. Remote attackers are able to inject own malicious script codes to the application-side of the vulnerable module. The execution of the script code occurs in the `list` module of the `create` module. The request method to inject is POST and the attack vector is located on the application-side.

Playable v9.18 iOS – Multiple Web Vulnerabilities

The vulnerability allows remote attackers to inject own malicious script codes to the application-side of the vulnerable module. The persistent web vulnerability is located in the `name` value of the `playlist` module. Remote attackers are able to inject own malicious script codes to the application-side of the vulnerable module.

Recent Exploits: