header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Acoustica MP3 CD Burner 4.32 local buffer-overflow

Acoustica MP3 CD Burner 4.32 is prone to a buffer-overflow vulnerability when parsing a .asx playlist file. An attacker can entice a user to open a specially crafted .asx playlist file, allowing the execution of arbitrary shell code. This vulnerability occurs because the application fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized memory buffer.

Iris ID IrisAccess ICU 7000-2 Multiple XSS and CSRF Vulnerabilities

The application is prone to multiple reflected cross-site scripting vulnerabilities due to a failure to properly sanitize user-supplied input to the 'HidChannelID' and 'HidVerForPHP' POST parameters in the 'SetSmarcardSettings.php' script. Attackers can exploit this issue to execute arbitrary HTML and script code in a user's browser session. The application also allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Drupal RESTWS Module 7.x Remote PHP Code Execution

This module exploits the Drupal RESTWS module vulnerability. RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution. This module was tested against RESTWS 7.x with Drupal 7.5 installation on Ubuntu server.

Tiki Wiki Unauthenticated File Upload Vulnerability

This module exploits a file upload vulnerability in Tiki Wiki <= 15.1 which could be abused to allow unauthenticated users to execute arbitrary code under the context of the webserver user. The issue comes with one of the 3rd party components. Name of that components is ELFinder -version 2.0-. This components comes with default example page which demonstrates file operations such as upload, remove, rename, create directory etc. Default configuration does not force validations such as file extension, content-type etc. Thus, unauthenticated user can upload PHP file. The exploit has been tested on Debian 8.x 64bit and Tiki Wiki 15.1.

Matrix42 Remote Control Host – Unquoted Path Privilege Escalation

The unquoted path vulnerability in Matrix42 Remote Control Host allows an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. By copying notepad.exe to "C:Program Files (x86)Matrix42" and renaming it to ""Remote.exe""

Valve Steam 3.42.16.13 Local Privilege Escalation

The Steam directory located at C:Program Files (x86)Steam implement weak file permissions and allow anyone in the BUILTINUsers windows group to modify any file in the Steam directory and any of its child files and folders. Since Steam is a startup application by default this makes it particularly easy to achieve lateral/vertical privilege escalation and achieve code execution against any user running the application.

LeadTools Raster Dialog File Object (LTRDF14e.DLL v. 14.5.0.44) Remote Buffer Overflow Exploit

The LeadTools Raster Dialog File Object (LTRDF14e.DLL v. 14.5.0.44) is vulnerable to a remote buffer overflow exploit. This vulnerability can be exploited by an attacker to execute arbitrary code on the affected system.

Recent Exploits: