header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Certec EDV atvise SCADA server 2.5.9 Privilege Escalation Vulnerability

The application suffers from an unquoted search path issue impacting the service 'atserver' for Windows deployed as part of atvise SCADA. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.

DotNetNuke 07.04.00 Administration Authentication Bypass

DotNetNuke 07.04.00 does not prevent anonymous users from accessing the installation wizard, allowing a remote attacker to 'reinstall' DNN and gain unauthorized access as a SuperUser. Previous versions of DotNetNuke may also be affected.

Kernel Reference Counter Overflow Vulnerability

The vulnerability allows an attacker to create references to BPF programs, which can overflow the 32-bit reference counters in the kernel. By filling approximately 32GB of memory, the overflow can occur, subject to RLIMIT_MEMLOCK restrictions. This can lead to a kernel paging request error and potentially cause a system crash or instability.

CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection

Zabbix Agent 3.0.1 is vulnerable to a command injection vulnerability in the mysql.size user parameter. An attacker can exploit this vulnerability by injecting malicious input in the user parameter, leading to the execution of arbitrary commands on the target system. The vulnerability occurs due to improper sanitization of user input, allowing the injection of dangerous characters. This can be exploited by an attacker to execute arbitrary commands with the privileges of the user running the Zabbix Agent.

Acunetix WP Security 3.0.3 XSS

The Acunetix WP Security plugin 3.0.3 is vulnerable to Cross-Site Scripting (XSS) attacks. By inserting scripts into the content search field in WordPress, an attacker can exploit this vulnerability and execute malicious code.

Visual Basic Project Stack Overflow

The vulnerability occurs when the project description (Project Property page and select Company Name) is opened. The affected version is Visual Basic 6. The vulnerability can be exploited to cause DoS or privilege escalation. Owned registers are ESI and EDI. The company name is dumped at Memory Address of : 04520020. Due to stack overflow, USER32 gets stuck in a loop, causing 100% CPU usage and making the system unstable. UNICODE exploitation must be implemented to exploit this vulnerability. The generated binary file does not display any vendor information in EXE format due to overflow.

MagicISO Exploit Demo

This is a proof-of-concept demo for a buffer overflow exploit in MagicISO. The exploit allows for arbitrary code execution by overwriting registers and triggering exceptions. The vulnerable instructions are MOV DWORD PTR DS:[EDX],EAX and MOV DWORD PTR DS:[EAX+4],EDX. The exploit requires precise control of the buffer size and manipulation of null bytes in EDX and EAX registers. The SEH handler is overwritten to achieve the exploit.

Dokeos <= 1.8.0 SQL Injection Exploit

This exploit allows an attacker to retrieve the admin username and hash from the Dokeos <= 1.8.0 website. The vulnerability exists in the my_progress.php file, where an SQL query is executed without proper input validation. By injecting a specially crafted payload in the course parameter of the URL, the attacker can bypass authentication and retrieve sensitive information from the database.

Recent Exploits: