header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

EPSON EasyMP Network Projection 2.81 – ‘EMP_NSWLSV’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

HomeGuard Pro 9.3.1 – Insecure Folder Permissions

The HomeGuard Pro version 9.3.1 has insecure folder permissions which allows BUILTINUsers to have full control over the 'C:Program FilesHomeGuard Pro' folder. Additionally, the files and services within the folder also have insecure permissions, allowing BUILTINUsers to have full control over them.

Persits Software XUpload Control AddFolder BoF Exploit

This is a buffer overflow exploit for the Persits Software XUpload Control AddFolder() function. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit contains two shellcode payloads, one for executing calc.exe and another for establishing a bind shell on port 4444.

HP System Event Utility – Local Privilege Escalation

The HP System Event service "HPMSGSVC.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. HPMSGSVC.exe runs a background process that delivers push notifications. The problem is that HP Message Service will load and execute any arbitrary executable named "Program.exe" if found in the users c: drive. This results in arbitrary code execution persistence mechanism if an attacker can place an EXE in this location and can be used to escalate privileges from Admin to SYSTEM.

MyVideoConverter Pro 3.14 – ‘Output Folder’ Buffer Overflow

The exploit allows an attacker to execute arbitrary code by overflowing the 'Output Folder' field in MyVideoConverter Pro 3.14. By providing a specially crafted input, an attacker can overwrite the program's stack and control the execution flow, leading to remote code execution.

MyVideoConverter Pro 3.14 – ‘Movie’ Buffer Overflow

The exploit script creates a new file with the name 'Shell.txt' and copies the content inside. Then, when the program is started and the 'Movie' option is selected, the content of 'Shell.txt' is pasted into the 'Video Folder' field, resulting in the execution of the calculator.

Recent Exploits: