This exploit allows an attacker to bypass the User Account Control (UAC) on Windows 10 systems. It works by exploiting the fact that all executable files which are autoelevate true can be used to bypass UAC. The exploit is based on the fact that the Windows 10 UAC whitelist contains a list of known executable files which are allowed to run with elevated privileges. The exploit works by creating a malicious executable file which is added to the whitelist and then executed with elevated privileges.
This exploit is for CVE-2019-9810, a use-after-free vulnerability in Mozilla Firefox. The exploit is written in JavaScript and uses a combination of Array.prototype.slice() and Array.prototype.find() to create a Uint32Array with a length of 0x42424242. This allows the attacker to gain arbitrary read/write access to memory.
This script uses the symboliclink-testing-tools project, written by James Forshaw. The vulnerability allows an unprivileged local attacker to delete any file on the filesystem, or overwrite it with abritrary data hosted elsewhere (with limitations). This particular script will attempt to overwrite the file dsa_control.cmd with arbitrary data hosted on an external web server, partly disabling TMDS, even when agent self-protection is turned on. It can also be modified/simplified to simply delete the target file, if desired.
This exploit allows an attacker to execute arbitrary code on the vulnerable system by uploading a malicious image file. The vulnerability exists in the Verot 2.0.3 PHP class, which is used to upload files. The vulnerability is due to insufficient validation of the uploaded file, allowing an attacker to upload a malicious image file containing PHP code, which is then executed on the server.
A vulnerability in Broadcom CA Privileged Access Manager (PAM) 2.8.2 allows an unauthenticated attacker to execute arbitrary commands on the underlying operating system. This vulnerability is due to insufficient input validation of user-supplied data. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system.
OwnCloud 8.1.8 is vulnerable to username disclosure. An attacker can intercept the connection with Burp, share a file, typing anything and change the GET parameter to '*search=*'. This will return a JSON with all username informations.
HTML Injection has been discovered in the Online Clinic Management System created by bigprof/AppGini. An attacker can inject malicious HTML code into the symptom_name parameter of the HTTP POST request.
This vulnerability was originally released by me back on December 4, 2016, yet remains unfixed. Now, to make matters worse I will let you know "mark-of-the-web" MotW does not matter here, its just ignored. Meaning, if the .MCL file is internet downloaded it gets the MOTW but files still exfiltrated. Host the "FindMeThatBiotch.dtd" DTD file in the web-root of the attacker server Port 80 etc... Download the ".mcl" file using Microsoft Internet Explorer. Check the MotW where you downloaded the .MCL file dir /r and note the Zone.Identifier:$DATA exists. Open the file and BOOM! watch shitz leaving!... still vulnerable after all these years lol.
Revive Adserver 4.1.x <= 4.2 RC1 is vulnerable to PHP Object Injection which can be exploited to achieve Remote Code Execution. The exploit involves sending a maliciously crafted payload to the delivery/axmlrpc.php endpoint which can be used to write arbitrary files to the server. The exploit can be used to write a malicious PHP file to the server which can be used to execute arbitrary code.
Stored XSS has been discovered in the Online Invoicing System created by bigprof/AppGini editmembers section. Description parameter affected from this vulnerability. payload: <script>alert(123);</script>