header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

System Shield AntiVirus & AntiSpyware Arbitrary Write Privilege Escalation

This exploit is a privilege escalation vulnerability in System Shield AntiVirus & AntiSpyware. It allows an attacker to gain SYSTEM privileges by exploiting a vulnerability in the SetKernelObjectSecurity function. The vulnerability is caused by a lack of proper validation of the DACL_SECURITY_INFORMATION parameter, which allows an attacker to write arbitrary data to the MSIEXECKEY registry key. This can be used to gain SYSTEM privileges.

Advantech WebAccess BWSCADARest Login Method SQL Injection Authentication Bypass Vulnerability

Advantech WebAccess BWSCADARest Login Method is vulnerable to SQL Injection Authentication Bypass. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. This vulnerability affects Advantech WebAccess 8.0-2015.08.16 and earlier versions.

HPE iMC 7.3 Java RMI Registry Deserialization RCE Vulnerability

Chris Lyne (@lynerc) discovered a vulnerability in HPE iMC PLAT v7.3 (E0504) Standard, which allows remote attackers to execute arbitrary code via a crafted serialized Java object to the RMI service. This PoC will launch calc.exe.

Arq <= 5.10 local root privilege escalation exploit

This exploit is used to gain root privileges on Arq <= 5.10. It works by exploiting a vulnerability in the Arq Agent application, which is used to perform auto-updates. The exploit involves copying the Arq application to a user's home directory, compiling a payload, backing up the original files, and then installing the payload. Once the payload is installed, the exploit is triggered by opening the Arq Agent application, which will then execute the payload and gain root privileges.

Application wide CSRF Bypass

A CSRF vulnerability was discovered in KeystoneJS 4.0.0 which allows an attacker to bypass the CSRF protection and create a new user. The vulnerability exists due to the lack of CSRF protection for the /keystone/api/users/create endpoint. An attacker can craft a malicious HTML page and trick a logged-in user into submitting the form, resulting in a new user being created.

Trend Micro Threat Discovery Appliance <= 2.6.1062r1 dlp_policy_upload.cgi Remote Code Execution Vulnerability

The vulnerabity is that the dlp_policy_upload.cgi allows the upload of a zip file, located statically as: /var/dlp_policy.zip. The problem is that we can then get that file extracted using admin_dlp.cgi. This gets extracted into 2 locations: - /eng_ptn_stores/prod/sensorSDK/data/ - /eng_ptn_stores/prod/sensorSDK/backup_pol/. We can then use symlinks to craft a symlinked that points to /opt/TrendMicro/MinorityReport/bin/. This is a clever trick, basically, we cant traverse since unzip checks for ../ (even though spec says its ok). We can still exploit this however by extracting a symlink to say a directory and then write into that directory.

Netis-WF2419 Router Cross-Site Request Forgery (CSRF)

A cross-site request forgery web vulnerability has been discovered in the official Netis-WF2419 Router. The vulnerability allows remote attackers to manipulate client-side web-application to browser requests to compromise the router by execution of system specific functions without session protection. A remote attacker is able to delete Address Reservation List settings of Netis Router with a cross-site request forgery html script code. The vulnerability can be exploited by loading embedded html code in a site or page. The issue can also be exploited by attackers to external redirect an user account to malicious web pages. The issue requires medium user interaction in case of exploitation. The request method to execute is GET and the attack vector is located on the client-side of the router firmware.

Multilanguage Real Estate MLM Script <= 3.0 - SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/product-list.php?srch=[SQL] %73%66%64%27%29%20%20%2f%2a%21%30%38%38%38%38%55%4e%49%4f%4e%2a%2f%28%2f%2a%21%30%38%38%38%38%53%45%4c%45%43%54%2a%2f%20%28%31%29%2c%28%32%29%2c%43%4f%4e%43%41%54%5f%57%53%28%30%78%32%30%33%61%32%30%2c%55%53%45%52%28%29%2c%44%41%54%41%42%41%53%45%28%29%2c%56%45%52%53%49%4f%4e%28%29%29%2c%28%34%29%29%2d%2d%20%2d

Recent Exploits: