header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Faleemi Desktop Software 1.8.2 – ‘SavePath for ScreenShots’ Buffer Overflow (SEH)

A buffer overflow vulnerability exists in Faleemi Desktop Software 1.8.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a maliciously crafted input to the 'Save Path for Snapshot and Record file' field, resulting in arbitrary code execution.

Clone2Go Video to iPod Converter 2.5.0 – Denial of Service (PoC)

The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction. For security demonstration or to reproduce follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability include installing the software, copying a string from bof.txt to clipboard, running VideoConverter.exex, going to Menu > Edit > Options > Set Output folder (Input), pasting the input string and clicking Open, a messagebox opens, clicking ok, and the software will stable crash or shut down.

InduSoft Web Studio 8.1 SP1 – ‘Tag Name’ Buffer Overflow (SEH)

InduSoft Web Studio 8.1 SP1 is vulnerable to a local buffer overflow (SEH Unicode) when a specially crafted 'Tag Name' is pasted into the application. This can be exploited by an attacker to execute arbitrary code on the target system.

LG Smart IP Camera 1508190 – Backup File Download

Smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password.

MyBB 1.8.17 – Cross-Site Scripting

On the forum RSS Syndication page you can generate a URL for example... http://localhost/syndication.php?fid=&type=atom1.0&limit=15, the thread titles on those generated links aren't sanitized. To exploit this vulnerability, a malicious user can create a thread with a malicious payload as the thread title, which when clicked will redirect the user to a malicious website.

Unauthenticated Remote SQLi

IBM IGI version 5.2.3.2 is suffering from unauthenticated remote SQLi. The vulnerability enable remote unauthenticated attacker to take over the server database and affect the confidentiality, integrity and availability of the system. The vulnerability is in the survey end point API /survey/api/config?userId=XXX, where the userId parameter value is injected directly to a sql query without sensitization nor validation and by exploiting it the attacker will be able to gain access on the server database.

Infiltrator Network Security Scanner 4.6 – Denial of Service (PoC)

A buffer overflow vulnerability exists in Infiltrator Network Security Scanner 4.6, which could allow an attacker to cause a denial of service condition. An attacker can create a malicious file containing 6000 bytes of data and paste the contents of the file into the 'Scan Target' field. When the 'Scan' button is clicked, the application will crash.

PDF Explorer 1.5.66.2 – Denial of Service (PoC)

When a maliciously crafted file is opened in PDF Explorer 1.5.66.2, a denial of service (DoS) condition can be triggered. This is due to a buffer overflow error when the contents of the file are copied into the 'Label' field of the 'Custom fields settings' window. This causes the application to crash.

Recent Exploits: