header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Proof of concept exploit on IE 5.x – 6.x by Alumni

The exploit takes advantage of a flaw in URLMON.DLL when converting backslashes to wide char. This can be seen on the stack dump near '&CLSID=AAA...2F__2F__...'. The exploit involves starting a server perl script and connecting to the http-service using IE/5.x. The shellcode size is limited up to 56 bytes. The '$ret' and image base of KERNEL32.DLL may differ. The shellcode is given 'as is' with the help of JScript.

Kerberos Version 1.5.1 Kadmind Remote Root Buffer Overflow Vulnerability

Remotely exploitable buffer overflow vulnerability in Kerberos kadmind service. The vulnerability can be triggered during the administration of principals via kadmin or kadmin.local, allowing the attacker to gain root access or perform a denial of service attack against kadmind.

HIOX FREE Guest Book Remote Code Execution Vulnerability

The vulnerability allows an attacker to execute remote code on the target system. The exploit involves opening the target by browser, inserting bad code in an email, and accessing the bad code through a specific URL. The vulnerability allows an attacker to execute arbitrary commands on the target system.

CSRF/Stored XSS vulnerability in Manage Engine Asset Explorer

This Product is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can execute arbitrary code into Asset list(AssetListView.do). Once exploited, admin’s browser can be made to do almost anything the admin user could typically do by hijacking admin's cookies etc.

Adobe Flash Player domainMemory ByteArray Use After Free

This module exploits a use-after-free vulnerability in Adobe Flash Player. The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed from an ActionScript worker, when forcing a reallocation by copying more contents than the original capacity, but Flash forgets to update the domainMemory pointer, leading to a use-after-free situation when the main worker references the domainMemory again. This module has been tested successfully on Windows 7 SP1 (32-bit), IE 8 and IE11 with Flash 17.0.0.134.

MacKeeper URL handler remote code execution vulnerability

A vulnerability has been discovered in MacKeeper's URL handler implementation that allows arbitrary remote code execution when a user visits a specially crafted webpage. Security researcher Braden Thomas discovered a flaw that allows arbitrary commands to be run as root with little to no user interaction required. A proof-of-concept (POC) has been released demonstrating how visiting a specially crafted webpage in Safari causes the affected system to execute arbitrary commands.

Homepage

Yet Another Related Posts Plugin' options can be updated with no token/nonce protection which an attacker may exploit via tricking website's administrator to enter a malformed page which will change YARPP options, and since some options allow html the attacker is able to inject malformed javascript code which can lead to code execution/administrator actions when the injected code is triggered by an admin user. Injected javascript code is triggered on any post page.

ANI Exploit

The exploit is a buffer overflow vulnerability in the ANI header parsing code in Microsoft Windows. It allows an attacker to execute arbitrary code on a target system by sending a specially crafted ANI file. The exploit includes a shellcode that creates a port bind shell on port 13579. The exploit has been tested on Windows XP SP2 - Portuguese.

Recent Exploits: