header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft PowerPoint 2010 Heap Overflow

A heap overflow vulnerability was observed in Microsoft PowerPoint 2010 running under Windows 7 x86 with application verifier enabled. The ecx register was pointing to invalid memory in this crash, which was passed in as the first argument to the crashing function. The calling function obtained this value from a pointer in stack memory at 0x0024e46c + 0x10. The allocation size was 0x20 bytes.

Kaltura Remote PHP Code Execution

This module exploits an Object Injection vulnerability in Kaltura. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the context of the web server user. Kaltura has a module named keditorservices that takes user input and then uses it as an unserialized function parameter. The constructed object is based on the SektionEins Zend code execution POP chain PoC, with a minor modification to ensure Kaltura processes it and the Zend_Log function's __destruct() method is called. Kaltura versions prior to 11.1.0-2 are affected by this issue.

ZineBasic 1.1 Remote File Disclosure Exploit

ZineBasic 1.1 is vulnerable to a remote file disclosure vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to view the contents of any file on the server.

Multiple Vulnerabilities – MuM Map Edit

MuM MapEdit provides geodata to the internet and intranets and is deployed on several communal and regional governmental infrastructures to provide geodata to the population. It consists of a silverlight client and a C#.NET backend. The communication between them is HTTP/S based and involves the NBFS (.NET Binary Format SOAP). The application requires users to provide their credentials via GET Parameters. They can therefore possibly be found in server logs or proxy logs. An authenticated user may send POST requests to the URL /Mum.Geo.Services/DataAccessService.svc. This service is used to execute SQL queries on the databases.

SolarWinds Kiwi Syslog Server Unquoted Service Path Privilege Escalation Vulnerability

The SolarWinds Kiwi Syslog Server is vulnerable to privilege escalation due to an unquoted service path. An authorized but non-privileged local user can exploit this vulnerability to execute arbitrary code with elevated privileges on the system.

Recent Exploits: