Rowhammer Linux Kernel Privilege Escalation Proof Of Concept

Proof of concept exploit code for the Linux Rowhammer DRAM privilege escalation vulnerability.

ManageEngine EventLog Analyzer Remote Code Execution

This Metasploit module exploits a SQL query functionality in ManageEngine EventLog Analyzer v10.6 build 10060 and previous versions. Every authenticated user, including the default “guest” account can execute SQL queries directly on the underlying Postgres database server. The queries are executed as the “postgres” user which has full privileges and thus is able to write […]

WinRAR SFX 5.21 Remote Code Execution

WinRAR SFX version 5.21 suffers from a remote code execution vulnerability.

BisonWare BisonFTP 3.5 Directory Traversal

BisonWare BisonFTP version 3.5 suffers from a directory traversal vulnerability.

Flash Failing Checks On uint Capacity Field

The latest version of the Vector.primitive length check in Flash 18,0,0,232 is not robust against memory corruptions such as heap overflows. While it is no longer possible to obviously bypass the length check there is still unguarded data in the object which could be corrupted to serve as a useful primitive.

Centreon 2.6.1 Add Administrator Cross Site Request Forgery

Centreon version 2.6.1 add administrator cross site request forgery exploit.

Photos In Wifi 1.0.1 File Upload

Photos in Wifi version 1.0.1 suffers from a remote shell upload vulnerability.

IconLover 5.4.5 Stack Buffer Overflow

IconLover version 5.4.5 suffers from a stack buffer overflow vulnerability.

Centreon 2.6.1 Command Injection

Centreon version 2.6.1 suffers from a command injection vulnerability. The POST parameter ‘persistant’ which serves for making a new service run in the background is not properly sanitized before being used to execute commands. This can be exploited to inject and execute arbitrary shell commands as well as using cross site request forgery attacks.

Vtiger CRM 6.3 Remote Code Execution

Vtiger CRM versions 6.3 and below suffer from an authenticated remote code execution vulnerability.