This is a weaponized exploit for the NetUSB kernel vulnerability discovered by SEC Consult Vulnerability Lab. It is a remotely exploitable kernel vulnerability that allows code execution. The exploit utilizes stack smashing, ROP, decoding, staging, and spawning a userland process. Currently, the exploit is weaponized for one target device. This python script serves as a proof of concept.
The Office Viewer software, specifically the OA.ocx version 3.2.0.5, is vulnerable to multiple methods of denial of service attacks. The vulnerability allows an attacker to crash the software by exploiting certain methods such as DoOleCommand, FTPDownloadFile, FTPUploadFile, HttpUploadFile, Save, and SaveWebFile.
This exploit targets ActSoft DVD-Tools (dvdtools.ocx v. 3.8.5.0) and causes a stack overflow. It was originally disclosed by shinnai and can be found on the following sites: http://www.shinnai.altervista.org/viewtopic.php?id=41&t_id=30 and http://www.milw0rm.com/exploits/3307. The exploit has been tested on Windows XP Professional SP2 with Internet Explorer 7.
The vulnerability allows an attacker to perform a remote SQL injection attack by exploiting the 'vendorid' parameter in the 'censura.php' script. By manipulating the parameter, an attacker can execute arbitrary SQL queries and potentially retrieve sensitive information from the database.
The exploit allows an attacker to perform a SQL injection attack by modifying the 'prodid' parameter in the 'detail.php' page. By injecting a specific payload, the attacker can retrieve the password hash of the admin user.
The vulnerability allows an attacker to execute arbitrary SQL queries in the database by manipulating the 'nid' parameter in the 'news_detail.php' script. By injecting SQL code, an attacker can retrieve sensitive information such as passwords from the 'admin' table.
The Windows driver used by projects derived from Truecrypt 7 (verified in Veracrypt and CipherShed) are vulnerable to a local elevation of privilege attack by abusing the drive letter symbolic link creation facilities to remap the main system drive. With the system drive remapped it’s trivial to get a new process running under the local system account.
This module exploits an arbitrary file upload vulnerability found in Kaseya VSA versions between 7 and 9.1. A malicious unauthenticated user can upload an ASP file to an arbitrary directory leading to arbitrary code execution with IUSR privileges. This module has been tested with Kaseya v7.0.0.17, v8.0.0.10 and v9.0.0.3.
This vulnerability allows an attacker to perform a SQL injection attack on the Pre Classifieds Listings v1.0 website. By manipulating the 'category' parameter in the search.php page, the attacker can inject SQL code to retrieve sensitive information such as passwords or usernames from the 'users' table.
This exploit allows an attacker to execute arbitrary commands on the server by injecting them into the PHP code. In this case, the attacker is executing the command '/bin/ps aux' using the backtick operator (`) and piping the output to the 'nl2br' function to format it as HTML.