header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unauthorized Change Prevention Bypass

Attackers or malwarez that can access the system hosting the OfficeScan XG AV, can bypass the antivirus protection feature that prevents unauthorized changes from being made like killing protected OfficeScan XG processes such as 'PccNTMon.exe'. The exploit requires Admin permissions to exploit.

Monstra CMS < 3.0.4 - Cross-Site Scripting

Monstra CMS version 3.0.4 and earlier is vulnerable to Cross-Site Scripting. An attacker can exploit this vulnerability by intercepting the first request through a proxy tool to verify the CSRF token and then sending a malicious script to the target. This can be done by sending a POST request to the target with the malicious script in the 'page_title' parameter.

WampServer 3.0.6 – Cross-Site Request Forgery

An issue was discovered in WampServer 3.0.6 which allows a remote attacker to force any victim to add or delete virtual hosts. Add virtual hosts exploit: An HTML form is used to send a POST request to the vulnerable add_vhost.php page with the parameters vh_name, vh_ip, and vh_folder. Delete virtual hosts exploit: An HTML form is used to send a POST request to the vulnerable add_vhost.php page with the parameter virtual_del[] set to the name of the virtual host to be deleted.

mptcp_usr_connectx

mptcp_usr_connectx is the handler for the connectx syscall for the AP_MULTIPATH socket family. The logic of this function fails to correctly handle source and destination sockaddrs which aren't AF_INET or AF_INET6. This PoC triggers the issue to overwrite the mpte_itfinfo field leading to a controlled pointer being passed to kfree when the socket is closed.

MacOS kernel UAF due to lack of locking in nvidia GeForce driver

nvDevice::SetAppSupportBits is external method 0x107 of the nvAccelerator IOService. It calls task_deallocate without locking. Two threads can race calling this external method to drop two task references when only one is held. Note that the repro forks a child which give the nvAccelerator a different task otherwise the repro is more likely to leak task references than panic.

Jenkins mailer plugin < 1.20 - Cross-Site Request Forgery

A Cross-Site Request Forgery (CSRF) vulnerability exists in Jenkins mailer plugin versions below 1.20, which allows attackers to send malicious emails to arbitrary recipients. This vulnerability is due to insufficient CSRF protection in the mailer plugin. An attacker can exploit this vulnerability by tricking a user into clicking a malicious link or sending a malicious request to the Jenkins server.

XSS at Brother HL series printers

Starting searching for printers without having a password. When you see a yellow bar with ''Configure the password'' you can take over the full printer by putting a password on it. If you want to execute the XSS you need to be loged into the web interface first. Go to the following url: http://127.0.0.1/ and login with ''admin'' as password. Intercept now the request with Burpsuite. The XSS exist in the loginerror.html?url= parameter.

Recent Exploits: