header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ubisoft CoGSManager ActiveX control Remote Stack-based Buffer Overflow Vulnerability

The Ubisoft CoGSManager ActiveX control is prone to a remote stack-based buffer-overflow vulnerability due to a lack of proper bounds checking on user-supplied input. Attackers can exploit this vulnerability to execute arbitrary code within the context of an application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.

Ubisoft Uplay Desktop Client 63.0.5699.0 – Remote Code Execution

The Uplay desktop client does not properly validate user-controlled data passed to its custom uplay URI protocol handler. This flaw can be used to exploit the Chromium Embedded Framework (CEF) integrated within the Uplay client, allowing for arbitrary code execution.

Uplay 92.0.0.6280 – Local Privilege Escalation

"C:Program Files (x86)UbisoftUbisoft Game Launcher" has insecure permissions that allow all BUILTIN-USER to have full permission. An attacker can replace the vulnerable executable file with a malicious file.

Ubisoft Rayman Legends v1.2.103716 Remote Stack Buffer Overflow Vulnerability

The vulnerability is caused due to a memset() boundary error in the processing of incoming data thru raw socket connections on TCP port 1001, which can be exploited to cause a stack based buffer overflow by sending a long string of bytes on the second connection. Successful exploitation could allow execution of arbitrary code on the affected node.

Ubisoft uplay 2.0.3 Active X Control Arbitrary Code Execution

The uplay ActiveX component allows an attacker to execute any command line action. User must sign in, unless auto-sign in is enabled and uplay must not already be running. Due to the way the malicious executable is served (WebDAV), the module must be run on port 80, so please make sure you have enough privilege to do that. Ubisoft released patch 2.04 as of Mon 20th July.

Recent Exploits: