Microsoft Windows SMBv3 SMBGhost Remote Code Execution Exploit |
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. |
July 23, 2021 |
CVE-2020-0796 |
Windows |
Exploits / Remote |
Impact |
Dell dbutil Driver EoP Exploit |
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges. |
July 20, 2021 |
CVE-2021-21551 |
Windows |
Exploits / Local |
Impact |
LEADTOOLS IltmmCapture 17.5 Arbitrary File Overwrite Vulnerability |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
July 9, 2021 |
|
|
Exploits / Client Side |
SCADAPRO |
Brainchild Electronic Panel Studio Generated Projects Network Denial of Service |
Denial of service vulnerability present in the Brainchild Electronic Panel Studio. Vulnerability is very simple to trigger by sending special crafted request |
July 9, 2021 |
|
Windows |
Denial of Service / Remote |
SCADAPRO |
SmartPTT_SCADA_RCE |
SmartPTT SCADA 1.1.0.0 suffers from remote code execution vulnerability. It's located in ioServer in admin panel on 8101 port by default. Attacker with administrator privileges can write malicious script on C# and execute it on the server. Tested on SmartPTT SCADA 1.1.0.0 |
July 9, 2021 |
|
|
Exploits / Remote Code Execution |
SCADAPRO |
Samkoon HMI Manager Remote Heap Corruption PoC |
Remote DoS HMIManager in SKTOOLV |
July 9, 2021 |
|
Windows |
Denial of Service / Remote |
SCADAPRO |
Reliance4 SCADA Web Server Denial of Service |
Remote Denial Reliance4 SCADA Web Server Tested on: Reliance 4.9.0 Revision 45040 |
July 9, 2021 |
|
Windows |
Denial of Service / Remote |
SCADA |
Movicon 11.6 Scada/HMI platform Directory Traversal Vulnerability |
This module exploits a directory traversal vulnerability in AGG Software Web Server |
July 9, 2021 |
|
Windows |
Exploits / Remote |
SCADA |
Schneider Electric Concept 2.6XL Remote Arbitrary File Overwrite |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
July 9, 2021 |
|
|
Exploits / Client Side |
SCADA |
WiSCADA TsDatabase 0-Day Denial of Service |
Remote Denial Of Service in WiSCADA TsDatabase. Specially crafted packets may also be sent to WiSCADA TsDatabase port 80 (default), result in a denial-of-service. Exploit crash server process FHSvrService.exe |
July 9, 2021 |
|
|
Denial of Service / Remote |
SCADA |
CVE-2020-13935 (Apache Tomcat DoS) |
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104 |
July 9, 2021 |
|
|
Denial of Service / Remote |
IOT |
Apache Airflow 1.10.10 - Remote Code Execution |
ApacheAirflow_RCE |
July 9, 2021 |
|
|
Exploits / Remote Code Execution |
IOT |
DD-WRT 45723 UPNP Buffer Overflow Denial Of Service |
Remote Denial Of Service in DD-WRT 45723 UPNP |
July 9, 2021 |
|
Windows |
Denial of Service / Remote |
IOT |
Microsoft Windows Print Spooler PrintNightmare Local Privilege Escalation Exploit |
A Local Privilege Escalation vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. |
July 7, 2021 |
CVE-2021-1675 |
Windows |
Exploits / Local |
Impact |
Microsoft Windows HTTP UaF List DoS |
HTTP.sys has a use-after-free vulnerability that allows a remote attacker to crash the vulnerable machine. |
July 2, 2021 |
CVE-2021-31166 |
Windows |
Denial of Service / Remote |
Impact |
Cisco AnyConnect Posture Security Service TOCTOU Local Privilege Escalation Exploit Update |
The Security Service of Cisco AnyConnect Posture (HostScan) for Windows incorrectly restricts access to internal IPC commands. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges by sending crafted IPC commands.
This module bypasses CVE-2021-1366 by abusing a Time-of-check Time-of-use (TOCTOU) Race Condition in the priv_file_copy command.
This update adds code to launch the exploit for CVE-2021-1366 if the detected version is vulnerable to it. |
July 1, 2021 |
CVE-2021-1567 |
Windows |
Exploits / Local |
Impact |
Microsoft Windows win32kbase Use After Free using Direct Composition Privileged Escalation Exploit |
The vulnerability is an Use After Free Privilege Escalation in win32kbase and occurs in the DirectComposition::CInteractionTrackerBindingManagerMarshaler::SetBufferProperty function, which is the handler for the SetResourceBufferProperty command of a CInteractionTrackerBindingManagerMarshaler. |
July 1, 2021 |
CVE-2021-26900 |
Windows |
Exploits / Local |
Impact |
Linux OverlayFS Attr Local Privilege Escalation Exploit |
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges. |
June 22, 2021 |
CVE-2021-3493 |
Linux |
Exploits / Local |
Impact |
Cisco AnyConnect Posture Security Service TOCTOU Local Privilege Escalation Exploit |
The Security Service of Cisco AnyConnect Posture (HostScan) for Windows incorrectly restricts access to internal IPC commands. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges by sending crafted IPC commands.
This module bypasses CVE-2021-1366 by abusing a Time-of-check Time-of-use (TOCTOU) Race Condition in the priv_file_copy command. |
June 16, 2021 |
CVE-2021-1567 |
Windows |
Exploits / Local |
Impact |
Microsoft Windows Graphics Component Elevation of Privilege Vulnerability Exploit |
An elevation of privilege vulnerability exists in Windows when the DirectComposition component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. |
June 11, 2021 |
CVE-2021-26868 |
Windows |
Exploits / Local |
Impact |
WiSCADA 2.0 0-Day Remote Arbitrary File Overwrite |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
June 7, 2021 |
|
|
Exploits / Client Side |
SCADAPRO |
Pult Online v270 Information leak |
Pult Online suffers from system information leak. The attacker can view the names of system files. By changing the directory for making a backup in the server configuration menu. So the files located in the previously selected folder will be displayed on the administrator system page. Tested on Pult Online v270 |
June 7, 2021 |
|
|
Exploits / Remote File Disclosure |
SCADAPRO |
Windows_IIS_Server_DOS |
Windows IIS Server Denial of Service |
June 7, 2021 |
|
|
Exploits / Denial of Service |
SCADAPRO |
Chamilo LMS 1.11.14 - Remote Code Execution |
ChamiloLMS_RCE |
June 7, 2021 |
|
|
Exploits / Remote Code Execution |
SCADAPRO |
openERM_SQLi |
SQL Injection in add_edit_event_user.php is caused by unsanitized user input from the eid, userid, and pid parameters. Exploiting this vulnerability requires authentication to Patient Portal Tested on OpenEMR 5.0.1 (Path 3) - SQL Injection |
June 7, 2021 |
|
|
Exploits / SQL Injection |
MEDICAL |