header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NetUSB Remote Code Execution exploit (Linux/MIPS)

This is a weaponized exploit for the NetUSB kernel vulnerability discovered by SEC Consult Vulnerability Lab. It is a remotely exploitable kernel vulnerability that allows code execution. The exploit utilizes stack smashing, ROP, decoding, staging, and spawning a userland process. Currently, the exploit is weaponized for one target device. This python script serves as a proof of concept.

Office Viewer (OA.ocx v. 3.2.0.5) multiple methods Denial of Service

The Office Viewer software, specifically the OA.ocx version 3.2.0.5, is vulnerable to multiple methods of denial of service attacks. The vulnerability allows an attacker to crash the software by exploiting certain methods such as DoOleCommand, FTPDownloadFile, FTPUploadFile, HttpUploadFile, Save, and SaveWebFile.

ActSoft DVD-Tools (dvdtools.ocx v. 3.8.5.0) Stack Overflow Exploit

This exploit targets ActSoft DVD-Tools (dvdtools.ocx v. 3.8.5.0) and causes a stack overflow. It was originally disclosed by shinnai and can be found on the following sites: http://www.shinnai.altervista.org/viewtopic.php?id=41&t_id=30 and http://www.milw0rm.com/exploits/3307. The exploit has been tested on Windows XP Professional SP2 with Internet Explorer 7.

Censura v1.15.04 Remote SQL Injection

The vulnerability allows an attacker to perform a remote SQL injection attack by exploiting the 'vendorid' parameter in the 'censura.php' script. By manipulating the parameter, an attacker can execute arbitrary SQL queries and potentially retrieve sensitive information from the database.

Truecrypt 7 Derived Code/Windows: Drive Letter Symbolic Link Creation EoP

The Windows driver used by projects derived from Truecrypt 7 (verified in Veracrypt and CipherShed) are vulnerable to a local elevation of privilege attack by abusing the drive letter symbolic link creation facilities to remap the main system drive. With the system drive remapped it’s trivial to get a new process running under the local system account.

Kaseya VSA uploader.aspx Arbitrary File Upload

This module exploits an arbitrary file upload vulnerability found in Kaseya VSA versions between 7 and 9.1. A malicious unauthenticated user can upload an ASP file to an arbitrary directory leading to arbitrary code execution with IUSR privileges. This module has been tested with Kaseya v7.0.0.17, v8.0.0.10 and v9.0.0.3.

Pre Classifieds Listings v1.0 Remote SQL Injection

This vulnerability allows an attacker to perform a SQL injection attack on the Pre Classifieds Listings v1.0 website. By manipulating the 'category' parameter in the search.php page, the attacker can inject SQL code to retrieve sensitive information such as passwords or usernames from the 'users' table.

Recent Exploits: