header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DVD Photo Slideshow Professional 8.07 – ‘Name’ Buffer Overflow

This exploit allows an attacker to create a specially crafted file that triggers a buffer overflow in DVD Photo Slideshow Professional version 8.07. By exploiting this vulnerability, an attacker can execute arbitrary code on the target system.

DVD Photo Slideshow Professional 8.07 – ‘Key’ Buffer Overflow

The exploit script creates a new file named 'key.txt' and copies its content. Then, when the program is started, the content of 'key.txt' is pasted into the 'Registration Key' field, causing a buffer overflow and allowing the exploit to run successfully.

Hot or Not Clone by Jnshosts.com Dump backup And See Password Admin

The Hot or Not Clone script by Jnshosts.com allows unauthorized access to the admin password by downloading the backup file and viewing it. The password can be found in the backup.sql file. The admin credentials are 'admin' for the username and 'desperad' for the password. The vulnerability also allows for the uploading of a shell. The admin control panel can be accessed at http://www.ratemyscript.com/control/. The uploaded shell can be seen at http://www.ratemyscript.com/banners/tryag.php.

Ricoh Driver Privilege Escalation

Various Ricoh printer drivers allow escalation of privileges on Windows systems. For vulnerable drivers, a low-privileged user can read/write files within the RICOH_DRV directory and its subdirectories. PrintIsolationHost.exe, a Windows process running as NT AUTHORITYSYSTEM, loads driver-specific DLLs during the installation of a printer. A user can elevate to SYSTEM by writing a malicious DLL to the vulnerable driver directory and adding a new printer with a vulnerable driver. This module leverages the prnmngr.vbs script to add and delete printers. Multiple runs of this module may be required given successful exploitation is time-sensitive.

usersctp sctp_load_addresses_from_init Function Out-of-Bounds Read Vulnerability

There is a vulnerability in the sctp_load_addresses_from_init function of usersctp that can lead to a number of out-of-bound reads. The input to sctp_load_addresses_from_init is verified by calling sctp_arethere_unrecognized_parameters, however there is a difference in how these functions handle parameter bounds. The function sctp_arethere_unrecognized_parameters does not process a parameter that is partially outside of the limit of the chunk, meanwhile, sctp_load_addresses_from_init will continue processing until a parameter that is entirely outside of the chunk occurs. This means that the last parameter of a chunk is not always verified, which can lead to parameters with very short plen values being processed by sctp_load_addresses_from_init. This can lead to out-of-bounds reads whenever the plen is subtracted from the header len.

Recent Exploits: