header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wondershare Driver Install Service help 10.7.1.321 – ‘ElevationService’ Unquote Service Path

The Wondershare Driver Install Service help version 10.7.1.321 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker with local access to escalate privileges and execute arbitrary code with elevated privileges. The vulnerable service, ElevationService, has an unquoted service path that could allow an attacker to place a malicious executable in a higher privileged directory, which will be executed when the service is started.

Zeroshell 3.9.0 Remote Command Execution

This module exploits an unauthenticated command injection vulnerability found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options.

nopCommerce Store 4.30 – ‘name’ Stored Cross-Site Scripting

This vulnerability allows an attacker to inject a malicious script directly into a vulnerable web application. In the case of nopCommerce Store 4.30, the XSS payload can be injected in Schedule tasks. When a user visits the page with the injected payload, the XSS is triggered, allowing the attacker to steal cookies.

Boxoft Audio Converter 2.3.0 – ‘.wav’ Buffer Overflow (SEH)

The Boxoft Audio Converter version 2.3.0 is vulnerable to a local buffer overflow (SEH) exploit. By opening a specially crafted '.wav' file, an attacker can trigger the buffer overflow and potentially execute arbitrary code.

Boxoft Convert Master 1.3.0 – ‘wav’ SEH Local Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable system. By providing a specially crafted 'wav' file, an attacker can trigger a buffer overflow condition, overwrite the Structured Exception Handler (SEH) chain, and gain control of the program's execution flow. This exploit includes a bind shell on port 4444.

IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 – id’ Field Stack Based Buffer Overflow

This exploit targets a stack based buffer overflow vulnerability in the IBM Tivoli Storage Manager Command Line Administrative Interface version 5.2.0.1. By exploiting this vulnerability, an attacker can execute arbitrary code or crash the application. The vulnerability occurs when the 'id' field is not properly validated, allowing the attacker to overflow the buffer and overwrite the EIP register. This exploit provides a step-by-step usage guide and includes the necessary code to trigger the vulnerability.

Recent Exploits: