header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AF_PACKET chocobo_root Privilege Escalation

This module exploits a race condition and use-after-free in the packet_set_ring function in net/packet/af_packet.c (AF_PACKET) in the Linux kernel to execute code as root (CVE-2016-8655). The bug was initially introduced in 2011 and patched in 2016 in version 4.4.0-53.74, potentially affecting a large number of kernels; however this exploit targets only systems using Ubuntu (Trusty / Xenial) kernels 4.4.0 < 4.4.0-53, including Linux distros based on Ubuntu, such as Linux Mint. The target system must have unprivileged user namespaces enabled and two or more CPU cores. Bypasses for SMEP, SMAP and KASLR are included. Failed exploitation may crash the kernel. This module has been tested successfully on Linux Mint 17.3 (x86_64); Linux Mint 18 (x86_64); and Ubuntu 16.04.2 (x86_64) with kernel versions 4.4.0-45-generic and 4.4.0-51-generic.

Siemens SIMATIC S7-1200 CPU – Cross-Site Scripting

The Siemens SIMATIC S7-1200 CPU family versions V2.X and V3.X are vulnerable to cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by injecting malicious script code into the 'filtervalue' parameter of the '/Portal/Portal.mwsl' page. This can lead to the execution of arbitrary code in the context of the victim's browser, potentially allowing the attacker to steal sensitive information or perform unauthorized actions.

Zechat 1.5 – ‘hashtag’ / ‘v’ SQL Injection / Cross site request forgery

The Zechat 1.5 application is vulnerable to SQL Injection and Cross Site Request Forgery (CSRF) attacks. The 'hashtag' parameter is susceptible to Union-based SQL Injection, allowing an attacker to extract information from the database. The 'v' parameter is vulnerable to Time-based Blind SQL Injection, enabling an attacker to execute arbitrary SQL queries. Additionally, the application is vulnerable to CSRF, which allows an attacker to change user's information without proper authentication.

SQL Injection in MDPro 1.0.76

This exploit allows an attacker to perform SQL injection in MDPro 1.0.76. The vulnerability is due to improper input validation in the application. An attacker can manipulate the input fields to execute arbitrary SQL queries, which can lead to unauthorized access, data manipulation, or information disclosure. The exploit works by injecting SQL statements into the application's database queries.

Recent Exploits: