header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Network Manager VPNC Username Privilege Escalation

This module exploits an injection vulnerability in the Network Manager VPNC plugin to gain root privileges. It uses a new line injection vulnerability in the configured username for a VPN network connection to inject a `Password helper` configuration directive into the connection configuration. The specified helper is executed by Network Manager as root when the connection is started. Network Manager VPNC versions prior to 1.2.6 are vulnerable. This module has been tested successfully with VPNC versions: 1.2.4-4 on Debian 9.0.0 (x64); and 1.1.93-1 on Ubuntu Linux 16.04.4 (x64).

Argus Surveillance DVR 4.0.0.0 – Privilege Escalation

Argus Surveillance DVR 4.0.0.0 devices allow Trojan File SYSTEM Privilege Escalation. Placing a Trojan File DLL named "gsm_codec.dll" in Argus application directory will lead to arbitrary code execution with SYSTEM integrity. Affected Component: DVRWatchdog.exe

jetAudio 7.x (m3u File) 0day Local SEH Overwrite Exploit

This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in jetAudio 7.x. By crafting a specially crafted m3u file, an attacker can overwrite the SEH record and execute arbitrary code. The exploit has been tested on jetAudio 7.0.3 Basic on Windows 2000 SP4 Polish. The exploit payload is a Windows Execute Command shellcode that launches the Calculator. This exploit is provided for educational purposes only.

Drive Power Manager 1.10 – Denial Of Service (PoC)

This exploit is a proof of concept for a denial of service vulnerability in Drive Power Manager version 1.10. By creating a specially crafted payload and passing it as input to the 'Name' field in the program, an attacker can cause the application to crash.

WWWISIS (Search) Multiple Vulnerabilities

The exploit allows an attacker to disclose local files and execute arbitrary scripts on the server. The Local File Disclosure vulnerability can be exploited by accessing the server's CGI script with a specially crafted path, while the Cross Siting Scripting vulnerability can be exploited by injecting malicious scripts into the server's CGI script.

R v3.4.4 – (SEH) Buffer Overflow Exploit

A local buffer overflow vulnerability has been discovered in the official R v3.4.4 software. The vulnerability allows local attackers to overwrite the registers (example eip) to compromise the local software process. The issue can be exploited by local attackers with system privileges to compromise the affected local computer system. The vulnerability is marked as classic buffer overflow issue.

Recent Exploits: