header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OpenSMTPD 6.6.1 – Local Privilege Escalation

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the 'uncommented' default configuration. The issue exists because of an incorrect return value upon failure of input validation.

Wedding Slideshow Studio 1.36 – ‘Name’ Buffer Overflow

A buffer overflow vulnerability exists in Wedding Slideshow Studio 1.36 when a long string is entered into the 'Registration Name' field. An attacker can exploit this vulnerability by running a python exploit script which will create a new file with the name 'name.txt'. The attacker can then copy the text inside 'name.txt' and paste it into the 'Registration Name' field. This will cause a buffer overflow and allow the attacker to execute arbitrary code on the vulnerable system.

Disk Savvy Enterprise 12.3.18 – Unquoted Service Path

Disk Savvy Enterprise 12.3.18 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system. The vulnerability exists because the Disk Savvy Enterprise service is installed with an unquoted service path. An attacker can exploit this vulnerability by placing malicious files in the same directory as the service executable. When the service is started, the malicious files will be executed with elevated privileges.

Disk Sorter Enterprise 12.4.16 – ‘Disk Sorter Enterprise’ Unquoted Service Path

Disk Sorter Enterprise 12.4.16 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path. The service path is not properly quoted, allowing an attacker to inject malicious code into the service path. This can be exploited by an attacker to gain elevated privileges on the system.

Sync Breeze Enterprise 12.4.18 – ‘Sync Breeze Enterprise’ Unquoted Service Path

An unquoted service path vulnerability exists in Sync Breeze Enterprise 12.4.18. An attacker can exploit this vulnerability to gain elevated privileges on the system. The vulnerability is due to the Sync Breeze Enterprise service not being properly quoted. An attacker can exploit this vulnerability by placing malicious files in the same directory as the Sync Breeze Enterprise service executable. When the service is started, the malicious files will be executed with SYSTEM privileges.

CHIYU BF430 TCP IP Converter – Stored Cross-Site Scripting

In CHIYU BF430 web page, user can modify the system configuration by access the /if.cgi. Attackers can inject malicious XSS code in "TF_submask" field. The XSS code will be stored in the database, so that causes a stored XSS vulnerability.

Shared Memory Issues in AGXCommandQueue

The IOAccelKernelCommand contains an 8-byte header consisting of a command type and size, followed by structured data specific to the type of command. When verifying that the size of the IOAccelKernelCommand has enough data for the specific command type, it appears that the check excludes the size of the 8-byte header, meaning that processSegmentKernelCommand() will parse up to 8 bytes of out-of-bounds data. This makes it possible to overwrite the first 1-8 bytes of the subsequent page of memory with timestamp data.

Recent Exploits: