header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ManageEngine Applications Manager 11.0 < 14.0 SQL Injection / Remote Code Execution

This module exploits sql and command injection vulnerability in the ManageEngine AM 14 and prior versions. An unauthenticated user can gain the authority of "system" on the server due to SQL injection vulnerability. Exploit allows the writing of the desired file to the system using the postgesql structure. Module is written over the payload by selecting a file with the extension ".vbs" that is used for monitoring by the ManageEngine which working with "system" authority. In addition, it dumps the users and passwords from the database for us. Keep in mind! After the harmful ".vbs" file is written, the shell session may be a bit late. Because the ManageEngine application should run this file itself.

Heap Corruption in Oracle Java Runtime Environment

A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. It manifests itself in the form of a crash when running the command 'bin/java -cp . DisplaySfntFont test.ttf'. The crash can also be triggered under Valgrind on Linux platforms.

MailCarrier 2.51 – SEH Remote Buffer Overflow in “RETR” command(POP3)

This exploit takes advantage of a remote buffer overflow vulnerability in the "RETR" command of the MailCarrier 2.51 POP3 server. By sending a specially crafted request, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program flow. This exploit creates a bind shell on port 443 and waits for a connection from the attacker.

LUAFV NtSetCachedSigningLevel Device Guard Bypass

The NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. The exploit involves creating a file with the contents of a valid Microsoft signed file, virtualizing that file using LUAFV, copying an unsigned executable to the virtual store with the target virtualized name, and calling NtSetCachedSigningLevel on the virtualized file.

Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) Privilege Escalation

Due to weak permissions setup on the bin, lib and tools directories within the ManageEngine installation directory, it is possible for any authenticated user to modify several core files.To escalate privileges to that of LOCAL SYSTEM, drop a payload onto the system and then add a line to binChangeJRE.bat to execute it every time the system is rebooted.

MailCarrier 2.51 – SEH Remote Buffer Overflow in “TOP” command(POP3)

This exploit allows an attacker to execute arbitrary code by sending a specially crafted "TOP" command to a vulnerable MailCarrier server. The vulnerability occurs due to a buffer overflow in the handling of the command, allowing an attacker to overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow. This exploit has been tested on MailCarrier version 2.51 running on Windows XP Professional SP3 (x86).

Recent Exploits: