Exploiting Apache Struts ExceptionDelegator Vulnerability (CVE-2012-0391)
Exploiting MySQL Authentication Bypass Vulnerability (CVE-2012-2122)
Exploitation of this critical vulnerability is trivial and requires only to perform several authentication attempts with any password and a valid username until the MySQL server grants access.
After successful exploitation this exploit dumps information from the target MySQL server such as: version, available databases, password hashes of MySQL users to be cracked later, dumps some system files, in this example, /etc/password, etc. Depending on the configuration of the target MySQL server and privileges of the user selected other actions can be performed.
More information:
http://seclists.org/oss-sec/2012/q2/493
http://bugs.mysql.com/bug.php?id=64884
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122
Java 0-Day Vulnerability Exploit Demo (CVE-2012-4681)
This is a demo of the Java 0-Day Vulnerability made public on 08-26-2012 (now CVE-2012-4681): http://youtu.be/HO4yO7_5sEc?hd=1 (watch in HD)
This vulnerability was found being exploited in the wild and discovered by Michael Schierl.
This exploit was written based on the PoC published by @jduck1337 at http://pastie.org/pastes/4594319/text
Tested on Windows 7 with Internet Explorer, Firefox and Chrome (keep in mind this affects Java on all platforms)
The exploit is extremely easy to implement, not much needs to be changed from the public PoC besides adding code to drop a payload.
References:
http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html
http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html
http://immunityproducts.blogspot.com.ar/2012/08/java-0day-analysis-cve-2012-4681.html
New addition to the WCE FAQ: "How can I prevent WCE dumping my logon password in cleartext?"
http://www.ampliasecurity.com/research/wcefaq.html#preventcleartextpwddump
Java 7 Update 10 0-Day RCE Exploit Demo (CVE-2013-0422)
Exploit made public by http://www.twitter.com/Kafeine
Exploit code released publicly by Gdark - DamageLabs
References:
http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html
http://pastebin.com/raw.php?i=cUG2ayjh
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
WCE v1.4beta released
32bit version available at http://www.ampliasecurity.com/research/wce_v1_4beta_x32.zip
64bit version available at http://www.ampliasecurity.com/research/wce_v1_4beta_x64.zip
"Universal Binary" (works both on x32 and x64) available at http://www.ampliasecurity.com/research/wce_v1_4beta_universal.zip
WCE v1.41beta released (minor release)
Universal binary: http://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip
32bit: http://www.ampliasecurity.com/research/wce_v1_41beta_x32.zip
64bit: http://www.ampliasecurity.com/research/wce_v1_41beta_x64.zip
WCE v1.42beta released (32bit)
New in this version: bug fixes and improved support for unicode cleartext passwords.
http://www.ampliasecurity.com/research/wce_v1_42beta_x32.zip
WCE v1.42beta released (64bit)
New in this version: improved support for unicode passwords, improved "safe mode" no code injection.
http://www.ampliasecurity.com/research/wce_v1_42beta_x64.zip
CVE-2014-6271: Exploiting Bash Remote Code Execution Vulnerability
(CVE-2014-6271) Exploiting Bash Remote Code Execution Vulnerability
You can also read: Exploiting BASH Remote Code Execution Vulnerability (CVE-2014-6271)
(CVE-2014-8826) OS X Gatekeeper Bypass Vulnerability
(HTML) http://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html
(TXT) http://www.ampliasecurity.com/advisories/AMPLIA-ARA100614.txt
Blog post:
Bypassing OS X Gatekeeper