header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Use-after-free in URLStream.readObject

There is a use-after-free vulnerability in URLStream.readObject. If the object read is a registered class, the constructor will be invoked to create the object. If the constructor calls URLStream.close, the URLStream will be freed, and the deserialization function will continue to write to it.

PHP <= 7.0.4/5.5.33 SNMP format string exploit (32bit)

This exploit utilizes PHP's internal '%Z' (zval) format specifier to achieve code-execution. It fakes an object-type zval in memory and then bounces through it carefully. It also leaks a pointer to the string itself and edits the global variable with correct pointers before hitting it a second time to get EIP. It is a reliable exploit with a 100% success rate. Credit to Stefan Esser (@i0n1c) for the original idea.

Ol Bookmarks Manager 0.7.4 (root) Remote SQL Injection Vulnerabilities

The Ol Bookmarks Manager 0.7.4 (root) is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'id' parameter of the '/read/index.php' script. This allows the attacker to retrieve sensitive information from the database, such as passwords and login credentials.

ATutor 2.2.1 Directory Traversal / Remote Code Execution

This module exploits a directory traversal vulnerability in ATutor on an Apache/PHP setup with display_errors set to On, which can be used to allow us to upload a malicious ZIP file. On the web application, a blacklist verification is performed before extraction, however it is not sufficient to prevent exploitation. You are required to login to the target to reach the vulnerability, however this can be done as a student account and remote registration is enabled by default. Just in case remote registration isn't enabled, this module uses 2 vulnerabilities in order to bypass the authentication: 1. confirm.php Authentication Bypass Type Juggling vulnerability 2. password_reminder.php Remote Password Reset TOCTOU vulnerability

Cogent Datahub <= 7.3.9 Gamma Script Elevation of Privilege Vulnerability

The Cogent Datahub version 7.3.9 and below is vulnerable to an elevation of privilege vulnerability. By placing a specially crafted script file in the appropriate directory, an attacker can execute arbitrary code with elevated privileges. The vulnerability has been assigned the CVE-2016-2288 identifier.

OS X Kernel use-after-free in AppleKeyStore

The AppleKeyStore userclient uses an IOCommandGate to serialize access to its userclient methods. However, by racing two threads, one of which closes the userclient (which frees the IOCommandGate) and one of which tries to make an external method call, we can cause a use-after-free of the IOCommandGate.

Recent Exploits: