header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Code execution via path traversal

Typora 0.9.9.24.6 on macOS allows directory traversal, for the execution of arbitrary programs, via a file:/// or ../ substring in a shared note via abusing URI schemes. A crafted URI can be used in a note to perform this attack using file:/// has an argument or by traversing to any directory like (../../../../something.app). Since, Typro also has a feature of sharing notes, in such case attacker could leverage this vulnerability and send crafted notes to the victim to perform any further attack.

Cyberoam General Authentication Client 2.1.2.7 – Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam General Authentication Client 2.1.2.7 when a maliciously crafted server address is used. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.

Cyberoam Transparent Authentication Suite 2.1.2.5 – ‘NetBIOS Name’ Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam Transparent Authentication Suite 2.1.2.5 when a maliciously crafted 'NetBIOS Name' is sent to the application. An attacker can exploit this vulnerability to crash the application, resulting in a denial of service condition.

Cyberoam Transparent Authentication Suite 2.1.2.5 – ‘Fully Qualified Domain Name’ Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam Transparent Authentication Suite 2.1.2.5 when a maliciously crafted 'Fully Qualified Domain Name' is supplied. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.

Cyberoam SSLVPN Client 1.3.1.30 – ‘HTTP Proxy’ Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam SSLVPN Client 1.3.1.30 when a maliciously crafted HTTP Proxy address is used. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.

Cyberoam SSLVPN Client 1.3.1.30 – ‘Connect To Server’ Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam SSLVPN Client 1.3.1.30 when a maliciously crafted 'Connect To Server' field is sent to the application. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.

Axessh 4.2 – ‘Log file name’ Local Stack-based Buffer Overflow

Axessh 4.2 is vulnerable to a local stack-based buffer overflow vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The attacker can exploit this vulnerability by sending a specially crafted malicious payload to the vulnerable application. The payload contains a malicious shellcode which is then executed on the vulnerable system. The attacker can then gain access to the system and execute arbitrary code.

Opencart <= 3.0.3.2 'extension/feed/google_base' Remote Denial of Service PoC exploit

This PoC exploit is for Opencart versions <= 3.0.3.2. It is a remote denial of service exploit that targets the 'extension/feed/google_base' route. It has been tested on stores with more than 1000 products added. The exploit is used by running the cartkiller.sh script with the store URL, the number of threads, and the sleep time as parameters.

CVE-2019-0803

This exploit is a proof-of-concept (PoC) for a vulnerability in the Windows kernel (Win32k) that allows an attacker to gain elevated privileges. The vulnerability is caused by a race condition in the win32k!NtUserSetWindowLongPtr() function, which can be exploited to gain SYSTEM privileges.

Recent Exploits: