Yawcam Directory Traversal Vulnerability |
This module exploits a directory traversal vulnerability in Yawcam |
June 7, 2021 |
|
Windows |
Exploits / Remote |
IOT |
Ambarella Oryx RTSP Server Denial of service |
A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). |
June 7, 2021 |
|
Windows |
Denial of Service / Remote |
IOT |
Zivif Web Cameras Remote Command (reboot) Execution Exploit |
Exploits the vulnerability published in the CVE-2017-17105 advisory. |
June 7, 2021 |
CVE-2017-17105 |
|
Exploits / Remote |
IOT |
ICPDAS eLogger software 2.0.0.0 Denial of Service |
Remote Denial Of Service in ICPDAS eLogger. Specially crafted packets may also be sent to ICPDAS eLogger port 502 (default), result in a denial-of-service. Exploit crash server process RuntimeXP.exe |
June 3, 2021 |
|
|
Denial of Service / Remote |
SCADA |
Citect SCADA (Facilities) ciTextBox.ocx Remote File Create Vulnerability |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
June 3, 2021 |
|
|
Exploits / Client Side |
SCADA |
OpenPLC 3 - Remote Code Execution |
openPLC_RCE |
June 3, 2021 |
|
|
Exploits / Remote Code Execution |
SCADA |
MicroFocus OBM UCMDB Services Java Deserialization Vulnerability Remote Code Execution Exploit |
Hard-coded credentials for the diagnostics user can be used to authenticate in the UCMDB component.
Then a java deserialization vulnerability present in several endpoints of the UCMDB service can be used to execute OS commands. |
May 26, 2021 |
CVE-2020-11853 |
Windows, Linux |
Exploits / Authentication Weakness / Known Vulnerabilities |
Impact |
Pulse Connect Secure Custom Template Injection Remote Code Execution Exploit |
A vulnerability in the admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution. |
May 19, 2021 |
CVE-2020-8243 |
Linux |
Exploits / Remote Code Execution |
Impact |
Fernhill SCADA Server Denial of Service |
Remote Denial Of Service in Fernhill SCADA Windows Developer. Specially crafted packets may also be sent to Fernhill SCADA Server port 20295 (default), result in a denial-of-service. Exploit crash server process FHSvrService.exe |
May 12, 2021 |
|
|
Denial of Service / Remote |
SCADAPRO |
Merz MScada Server Denial of Service |
Remote Denial Of Service in Merz MScada Server. Specially crafted packets may also be sent to AspicKnot.exe port 8080 (default), result in a denial-of-service. Exploit crash server process AspicKnot.exe |
May 12, 2021 |
|
|
Denial of Service / Remote |
SCADAPRO |
Sudo Setcmnd Heap Buffer Overflow Local Privilege Escalation Exploit Update |
An improvement in the heap feng shui in order to add more stability and support for more versions. |
May 12, 2021 |
CVE-2021-3156 |
Linux |
Exploits / Local |
Impact |
Apache Unomi Remote Code Execution Exploit |
Apache Unomi allows conditions to use OGNL and MVEL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
|
May 12, 2021 |
CVE-2020-13942 |
Linux |
Exploits / OS Command Injection / Known Vulnerabilities |
Impact |
WebHMI_DOS |
WebHMI 4.0.7348 suffers from Denial of Service. An attacker with administrator rights can run a disk speed test. While the test is in progress, the server is sleep and unavailable. One test puts the server to sleep for about 45 seconds. An attacker can send several requests at once, thereby putting the server to sleep for a long time. |
May 9, 2021 |
|
|
Exploits / Denial of Service |
SCADA |
Mitsubishi MC Works64 SCADA Remote Arbitrary empty File Create |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
May 9, 2021 |
|
|
Exploits / Client Side |
SCADA |
Mitsubishi Electric MELSOFT Mediative Server Denial Of Service |
Remote Denial Of Service in MELSOFT Mediative Server |
May 9, 2021 |
|
Windows |
Denial of Service / Remote |
SCADA |
ICONICS AlarmWorX32 Report ActiveX Remote Arbitrary empty File Create |
This module will receive HTTP requests from vulnerable clients and install agents on them. |
May 9, 2021 |
|
|
Exploits / Client Side |
SCADA |
SysGauge Server Denial of Service |
SysGauge Server 3.6.18 the Control Protocl suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9221. |
May 9, 2021 |
|
Windows |
Denial of Service / Remote |
IOT |
Cisco Small Business SA500 Series - Local File Inclusion |
Cisco Small Business SA500 Series - Local File Inclusion |
May 9, 2021 |
|
Windows |
Exploits / Remote |
IOT |
AndroVideo Advan VD-1 Remote Password Disclosure |
AndroVideo Advan VD-1 Remote Password Disclosure |
May 9, 2021 |
CVE-2019-11064 |
|
Exploits / Client Side |
IOT |
TP-Link TL-WA855RE Device Reset Auth Bypass vulnerability |
TP-Link TL-WA855RE V5_200415 Device Reset Auth Bypass vulnerability |
May 9, 2021 |
CVE-2020-24363 |
|
Exploits / Client Side |
IOT |
Windows Win32k xxxClientAllocWindowClassExtraBytes Privilege Escalation Exploit Update |
This vulnerability is caused by xxxClientAllocWindowClassExtraBytes callback in win32kfull!xxxCreateWindowEx. The callback causes the setting of a kernel struct member and its corresponding flag to be out of sync.
This Update adds support for Windows 10 2004 and 20H2 |
May 7, 2021 |
CVE-2021-1732 |
Windows |
Exploits / Local |
Impact |
VMware vCenter Server uploadova TAR Directory Traversal Remote Code Execution Exploit |
Unauthenticated file upload vulnerability via uploadova plugin in VMware vCenter Server to upload and extract a TAR file.
The TAR file contains a path traversal that allows writing files at arbitraries locations. |
May 3, 2021 |
CVE-2021-21972 |
Windows, Linux |
Exploits / Remote |
Impact |
Microsoft Windows Print Spooler Service Arbitrary File Write Elevation of Privilege Vulnerability Exploit |
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. |
April 27, 2021 |
CVE-2020-1337 |
Windows |
Exploits / Local |
Impact |
Windows Win32k xxxClientAllocWindowClassExtraBytes Privilege Escalation Exploit |
This vulnerability is caused by xxxClientAllocWindowClassExtraBytes callback in win32kfull!xxxCreateWindowEx. The callback causes the setting of a kernel struct member and its corresponding flag to be out of sync. |
April 19, 2021 |
CVE-2021-1732 |
Windows |
Exploits / Local |
Impact |
Sudo Setcmnd Heap Buffer Overflow Local Privilege Escalation Exploit |
Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
|
April 15, 2021 |
CVE-2021-3156 |
Linux |
Exploits / Local |
Impact |