header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CVE-2016-1960 and ASM.JS JIT-Spray

This PoC exploit is against Firefox 44.0.2 and is a special ASM.JS float constant pool JIT-Spray shown at OffensiveCon 2018. It is tested on Firefox 44.0.2 32-bit - Windows 10 1709. The exploit involves serving the PoC over a network and opening it in Firefox 44.0.2 32-bit. A successful exploit attempt should pop calc.exe.

Android MediaDrmService ICrypto::decrypt() Buffer Overflow

A buffer overflow vulnerability exists in the ICrypto::decrypt() function of the Android MediaDrmService. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system. The vulnerability is caused by a lack of proper bounds checking when copying data from the source memory to the destination memory. An attacker can exploit this vulnerability by supplying a specially crafted source memory object that contains malicious data. This malicious data will then be copied to the destination memory, resulting in a buffer overflow.

Duplicator WordPress Migration Plugin Reflected Cross Site Scripting (XSS)

Duplicator is a wordpress plugin with more than 1 million of active installations. Version 1.2.32 (and possibly previous versionss) are affected by a Reflected XSS vulnerability. Arbitrary JavaScript code can be run on browser side if a user is tricked to click over a link or browse a URL under the attacker control.

Tuleap SQL Injection

Enalean Tuleap is a project management system for application lifecycles management, agile development and design projects, requirement management, IT services management, and so on. The analysis discovered a time-based blind SQL injection vulnerability (OTG-INPVAL-005) in the tracker functionality of Tuleap software engineering platform. A malicious user can inject arbitrary SQL commands to the application. The vulnerability lies in the project tracker service search functionality; depending on project visibility successful exploitation may or may not require user authentication. A successful attack can read, modify or delete data from the database or, depending on the privilege of the user (default: restricted) and the database engine in use (default: MySQL), execute arbitrary commands on the underlying system.

Mikrotik Chimay Red Stack Clash Exploit

Mikrotik Chimay Red Stack Clash Exploit is a vulnerability in Mikrotik RouterOS that allows an attacker to execute arbitrary code on the target system. The exploit is based on BigNerd95's POC and was tested on RouterOS 6.38.4 (x86). The exploit uses a technique called 'stack clash' which involves overflowing the stack of a thread and then using a ROP chain to execute arbitrary code. The exploit is written in Python and uses the pwntools library to generate the payload.

Arbitrary Code Execution

This exploit allows an attacker to execute arbitrary code on the target host by downloading a reverse shell payload from the attacker's machine and uploading it to the target host by bitsadmin and placing it in the target c:emp directory and saving it as shell.ps1. The second `Execute` command will execute the stored payload.

SC v7.16 Stack-Based Buffer Overflow Vulnerability

SC v7.16 is prone to a basic stack-based buffer overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. An attacker could exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Recent Exploits: