header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bypassing fusermount’s restrictions on allow_other mount option with SELinux active

The vulnerability allows an attacker to bypass fusermount's restrictions on the use of the 'allow_other' mount option when SELinux is active. By manipulating the 'context' parameter and using a specially crafted shared library, an attacker can mount a FUSE filesystem with the 'allow_other' option, gaining escalated privileges.

Microsoft Windows Kernel – ‘win32k!NtUserConsoleControl’ Denial of Service (PoC)

It is possible to trigger a BSOD caused by a Null pointer deference when calling the system call NtUserConsoleControl with the following arguments: NtUserControlConsole(1,0,8). NtUserControlConsole(4,0,8). NtUserControlConsole(6,0,12). NtUserControlConsole(2,0,12). NtUserControlConsole(3,0,20). NtUserControlConsole(5,0,8). Different crashes are reproduced for each case.

Allok MOV Converter 4.6.1217 – Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in Allok MOV Converter 4.6.1217. By running the python exploit script, a new file named 'exploit.txt' is created. The content of 'exploit.txt' is then pasted into the License name field of the Allok MOV Converter program, triggering the buffer overflow and causing a calculator to pop up.

QNap QVR Client 5.1.1.30070 – ‘Password’ Denial of Service (PoC)

The QNap QVR Client version 5.1.1.30070 is vulnerable to a denial of service attack when a specially crafted password is provided. By sending a large buffer of 'A' characters, the application crashes, resulting in a denial of service condition.

10-Strike Bandwidth Monitor 3.7 – Local Buffer Overflow SEH

The 10-Strike Bandwidth Monitor 3.7 software is vulnerable to a local buffer overflow exploit. By running a script and copying the generated code to the clipboard, an attacker can execute arbitrary code and gain unauthorized access to the system. This can be done either by pasting the code into the Bandwidth Monitor application or by going to the Help tab and clicking Registration. This exploit allows for the execution of a shell.

MicroFocus Secure Messaging Gateway Remote Code Execution

This module exploits a SQL injection and command injection vulnerability in MicroFocus Secure Messaging Gateway. An unauthenticated user can execute a terminal command under the context of the web user. One of the user supplied parameters of API endpoint is used by the application without input validation and/or parameter binding, which leads to SQL injection vulnerability. Successfully exploiting this vulnerability gives the ability to add a new user onto the system. manage_domains_dkim_keygen_request.php endpoint is responsible for executing an operating system command. It's not possible to access this endpoint without having a valid session. Combining these vulnerabilities gives the opportunity to execute operating system commands under the context of the web user.

JContentSubscription Joomla Component 1.5.8 Multiply Remote File Include Vulnerability

The JContentSubscription Joomla component version 1.5.8 is vulnerable to multiple remote file inclusion vulnerabilities. These vulnerabilities allow an attacker to include arbitrary remote files by manipulating the 'mosConfig_absolute_path' parameter in various files. By exploiting these vulnerabilities, an attacker can execute malicious code on the affected system.

Recent Exploits: