header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FTP Library Exploit

The FTP library in Python allows an attacker to inject malicious code through specially crafted input, leading to remote code execution. This vulnerability can be exploited by an attacker with network access to the vulnerable system.

TEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) “SaveImage()” Remote Arbitrary File Overwrite

The exploit overwrites the system.ini file, potentially causing the system to not restart. It affects the TEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) and can be triggered by calling the "SaveImage()" function.

Learning Management System Auth Bypass

The exploit allows an attacker to bypass authentication in the Learning Management System. By manipulating the login form, an attacker can log in as any user without providing valid credentials. This can lead to unauthorized access to sensitive information or actions within the system.

Macro Expert 4.0 Multiple Elevation of Privilege

Macro Expert installs as a service with an unquoted service path running with SYSTEM privileges. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. Additionally, the default installation path suffers from weak folder permission which an unauthorized user in the BUILTINUsers group could take advantage of.

Zortam Mp3 Media Studio 21.15 Insecure File Permissions Privilege Escalation

Zortam Mp3 Media Studio installs with weak file permissions, allowing any user full permission to the exe. This allows for code execution against any other user running the application.

Phoenix Exploit Kit Remote Code Execution

This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via the geoip.php. The Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which then silently installs malware.

Recent Exploits: