This module exploits sql and command injection vulnerability in the ManageEngine AM 14 and prior versions. An unauthenticated user can gain the authority of "system" on the server due to SQL injection vulnerability. Exploit allows the writing of the desired file to the system using the postgesql structure. Module is written over the payload by selecting a file with the extension ".vbs" that is used for monitoring by the ManageEngine which working with "system" authority. In addition, it dumps the users and passwords from the database for us. Keep in mind! After the harmful ".vbs" file is written, the shell session may be a bit late. Because the ManageEngine application should run this file itself.
A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. It manifests itself in the form of a crash when running the command 'bin/java -cp . DisplaySfntFont test.ttf'. The crash can also be triggered under Valgrind on Linux platforms.
This exploit takes advantage of a remote buffer overflow vulnerability in the "RETR" command of the MailCarrier 2.51 POP3 server. By sending a specially crafted request, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program flow. This exploit creates a bind shell on port 443 and waits for a connection from the attacker.
The NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. The exploit involves creating a file with the contents of a valid Microsoft signed file, virtualizing that file using LUAFV, copying an unsigned executable to the virtual store with the target virtualized name, and calling NtSetCachedSigningLevel on the virtualized file.
The LUAFV driver in Windows 10 1809 allows an attacker to bypass security checks and write an arbitrary short name during file virtualization, leading to an elevation of privilege.
The SxS manifest cache in CSRSS uses a weak key allowing an attacker to fill a cache entry for a system binary leading to EoP.
The vulnerability allows an attacker to include and execute arbitrary files from a remote server.
Due to weak permissions setup on the bin, lib and tools directories within the ManageEngine installation directory, it is possible for any authenticated user to modify several core files.To escalate privileges to that of LOCAL SYSTEM, drop a payload onto the system and then add a line to binChangeJRE.bat to execute it every time the system is rebooted.
This exploit allows an attacker to execute arbitrary code by sending a specially crafted "TOP" command to a vulnerable MailCarrier server. The vulnerability occurs due to a buffer overflow in the handling of the command, allowing an attacker to overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow. This exploit has been tested on MailCarrier version 2.51 running on Windows XP Professional SP3 (x86).
The PHP-CON 1.3 script is vulnerable to remote file inclusion. By manipulating the 'webappcfg[APPPATH]' parameter in the 'include.php' file, an attacker can execute arbitrary code on the server. This can lead to unauthorized access, data leakage, and potential server compromise.