header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RGui 3.5.0 – Local Buffer Overflow (SEH)(DEP Bypass)

This exploit takes advantage of a local buffer overflow vulnerability in RGui 3.5.0. By providing a specially crafted input, an attacker can overwrite the Structured Exception Handler (SEH) and bypass Data Execution Prevention (DEP). This allows the attacker to execute arbitrary code on the target system. The vulnerability was fixed in version 3.5.1 of RGui.

DOS Vulnerability in SharePoint 2016 Server

A vulnerability in Microsoft SharePoint Server could allow a remote attacker to make the server unavailable. The vulnerability is a result of the dependency SharePoint has in Microsoft.Data.OData library which was vulnerable to remote DOS (See CVE-2018-8269). The exploit is done by sending a crafted request that contains an OData filter that triggers the vulnerability in Microsoft.Data.OData library. Sending such request, will terminate the process that runs the server. By default, SharePoint server is configured to recover a terminated process, but it will do so only 10 times. If more than 10 malicious requests are sent in 5 minutes interval, the server will not recover and will be down until it is manually restarted.

Viewpoint Media Player for IE 3.2 (AxMetaStream.dll) Remote Stack Overflow

The AxMetaStream activex contains various methods which accept parameters as String. All these methods are vulnerable to a stack based buffer overflow when you pass an overly long (greater than 6999 characters).

KioWare Server Version 4.9.6 – Weak Folder Permissions Privilege Escalation

KioWare Server version 4.9.6 and older installs by default to "C:kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITYSYSTEM" by substituting the service's binary with a malicious one.

ASP Message Board Remote SQL Injection Exploit

This exploit allows an attacker to retrieve the admin user, password, and username from an ASP Message Board version 2.2.1c by exploiting a remote SQL injection vulnerability in the printer.asp script. The exploit URL is http://www.site.com/boards/printer.asp?forum=AMB_xxxx&id=xxxx or 1=convert(int,(select top 1 convert(varchar,isnull(convert(varchar,Admin),'NUL L'))%2b'/'%2bconvert(varchar,isnull(convert(varcha r,Password),'NULL'))%2b'/'%2bconvert(varchar,isnul l(convert(varchar,Username),'NULL')) from AMB_REGISTEREDUSERS)).

phpMoAdmin 1.1.5 – MongoDB GUI | Multiple Vulnerabilities

The phpMoAdmin version 1.1.5 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) attacks. The CSRF vulnerabilities allow an attacker to perform actions on behalf of the victim, such as creating a new database, dropping a database, repairing a database, and adding a new collection. The XSS vulnerabilities allow an attacker to inject malicious scripts into the application, potentially leading to session hijacking, defacement, or data theft.

Mailcleaner Remote Code Execution

This module exploits the command injection vulnerability of MailCleaner Community Edition product. An authenticated user can execute an operating system command under the context of the web server user which is root./admin/managetracing/search/search endpoint takes several user inputs and then pass them to the internal service which is responsible for executing operating system command. One of the user input is being passed to the service without proper validation. That cause a command injection vulnerability.

Recent Exploits: