header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Counter-Strike 1.6 ‘GameInfo’ Query Reflection DoS

Counter-Strike 1.6 is vulnerable to a Denial of Service attack due to a query reflection vulnerability. An attacker can send a specially crafted GameInfo request to a vulnerable server, which will then reflect the request back to the attacker's IP address. This can be used to flood the attacker's network with UDP traffic, resulting in a Denial of Service.

SysAid Help Desk ‘rdslogs’ Arbitrary File Upload

This module exploits a file upload vulnerability in SysAid Help Desk v14.3 and v14.4. The vulnerability exists in the RdsLogsEntry servlet which accepts unauthenticated file uploads and handles zip file contents in a insecure way. By combining both weaknesses, a remote attacker can accomplish remote code execution. Note that this will only work if the target is running Java 6 or 7 up to 7u25, as Java 7u40 and above introduces a protection against null byte injection in file names. This module has been tested successfully on version v14.3.12 b22 and v14.4.32 b25 in Linux. In theory this module also works on Windows, but SysAid seems to bundle Java 7u40 and above with the Windows package which prevents the vulnerability from being exploited.

TcpDump rpki_rtr_pdu_print Out-of-Bounds Denial of Service

TcpDump rpki_rtr_pdu_print Out-of-Bounds Denial of Service vulnerability allows an attacker to cause a denial of service (DoS) by sending a specially crafted packet to the target system. This vulnerability affects versions 4.6.2, 4.5.1, and 4.4.0 of TcpDump. The vulnerability can be triggered by sending a packet with a spoofed source IP address to the target system. The packet must be sent in verbose mode for the DoS to be triggered.

Airdroid iOS, Android & Win 3.1.3 – Persistent Vulnerability

The Vulnerability Laboratory Core Research Team discovered an application-side input validation web vulnerability in the official SandStudio AirDroid (windows, ios and android) mobile web-application. The vulnerability allows remote attacker or low privilege user accounts to inject malicious codes to the application-side of the affected mobile web-application. The vulnerability is located in the send messages and the send message with an attached file module. Remote attackers with low privilege user account are able to uploade malicious files to the application-side of the vulnerable mobile web-application.

Microsoft Word Local Machine Zone Remote Code Execution Vulnerability

Microsoft Word, Excel and Powerpoint 2007 contains a remote code execution vulnerability because it is possible to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context of the local machine zone of Internet Explorer which leads to arbitrary code execution. By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end) it is possible to triggerthe vulnerability and run arbitrary code in the context of the logged on Windows user.

D-Link Cookie Command Execution

This module exploits an anonymous remote upload and code execution vulnerability on different D-Link devices. The vulnerability is a command injection in the cookie handling process of the lighttpd web server when handling specially crafted cookie values. This module has been successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment.

Backdoor and RCE found in 8 TOTOLINK router models

A backdoor is present in several TOTOLINK products. This was confirmed by analysing the latest firmwares and by testing the backdoor against live routers. At least 8 TOTOLINK products are affected (firmwares come from totolink.net and from totolink.cn). By sending a crafted request to the WAN IP, an attacker will open the HTTP remote management interface on the Internet. Then an attacker can use a Remote Code Execution in the HTTP remote management interface by using the hidden /boafrm/formSysCmd form, bypassing the authentication system.

Recent Exploits: