CVE-2019-16098.zip
4.8 MB
CVE-2019-16098
Author: VortexCry-Organization
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
GitHub Link:
https://github.com/VortexCry-Organization/VortexCry-Ransomware
Author: VortexCry-Organization
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
GitHub Link:
https://github.com/VortexCry-Organization/VortexCry-Ransomware
CVE-2017-7921.zip
9.3 KB
CVE-2017-7921
Author: saaydmr
An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.
GitHub Link:
https://github.com/saaydmr/hikvision-exploiter
Author: saaydmr
An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.
GitHub Link:
https://github.com/saaydmr/hikvision-exploiter
CVE-2024-38063
Author: Avidan1
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/Avidan1/CVE-2024-38063
Author: Avidan1
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/Avidan1/CVE-2024-38063
CVE-2021-36260.zip
2.9 KB
CVE-2021-36260
Author: yanxinwu946
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
GitHub Link:
https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260
Author: yanxinwu946
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
GitHub Link:
https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260