0x09AL

15 exploits Active since Jun 2017
CVE-2018-8174 NOMISEC HIGH WORKING POC
Windows VBScript Engine - RCE
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
169 stars
CVSS 7.5
CVE-2017-11882 NOMISEC HIGH WORKING POC
Microsoft Office CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
97 stars
CVSS 7.8
CVE-2024-26169 NOMISEC HIGH WORKING POC
Microsoft Windows 10 1507 - Improper Privilege Management
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS 7.8
CVE-2018-8174 NOMISEC HIGH WORKING POC
Windows VBScript Engine - RCE
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVSS 7.5
CVE-2017-11882 PATCHAPALOOZA HIGH WORKING POC
Microsoft Office CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
CVSS 7.8
CVE-2017-11882 PATCHAPALOOZA HIGH WORKING POC
Microsoft Office CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
CVSS 7.8
CVE-2017-11189 WRITEUP MEDIUM WORKING POC
Rarzilla Unrar-free - NULL Pointer Dereference
unrarlib.c in unrar-free 0.0.1 might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash), which could be relevant if unrarlib is used as library code for a long-running application. NOTE: one of the several test cases in the references may be the same as what was separately reported as CVE-2017-14121.
CVSS 6.5
CVE-2018-17984 WRITEUP HIGH WORKING POC
ISPConfig <3.1.13 - Code Injection
An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. This is exploitable by authenticated users who have local filesystem access.
CVSS 7.8
CVE-2017-9757 EXPLOITDB HIGH python WORKING POC
IPFire 2.19 - Command Injection
IPFire 2.19 has a Remote Command Injection vulnerability in ids.cgi via the OINKCODE parameter, which is mishandled by a shell. This can be exploited directly by authenticated users, or through CSRF.
CVSS 8.8
CVE-2018-5413 EXPLOITDB HIGH python WORKING POC
Imperva SecureSphere <13.0-11.5 - Privilege Escalation
Imperva SecureSphere running v13.0, v12.0, or v11.5 allows low privileged users to add SSH login keys to the admin user, resulting in privilege escalation.
CVSS 8.8
CVE-2018-5412 EXPLOITDB HIGH ruby WORKING POC
Imperva SecureSphere <12.0.0.50 - RCE
Imperva SecureSphere running v12.0.0.50 is vulnerable to local arbitrary code execution, escaping sealed-mode.
CVSS 7.8
CVE-2017-9757 METASPLOIT HIGH ruby WORKING POC
IPFire 2.19 - Command Injection
IPFire 2.19 has a Remote Command Injection vulnerability in ids.cgi via the OINKCODE parameter, which is mishandled by a shell. This can be exploited directly by authenticated users, or through CSRF.
CVSS 8.8
EIP-2026-107972 EXPLOITDB python WORKING POC
ISPConfig < 3.1.13 - Remote Command Execution
EIP-2026-106175 EXPLOITDB python WORKING POC
CoSoSys Endpoint Protector 4.5.0.1 - (Authenticated) Remote Root Command Injection
EIP-2026-100719 EXPLOITDB ruby WORKING POC
IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)