header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ModbusPal XXE Injection

ModbusPal 1.6b is vulnerable to an XML External Entity (XXE) attack. Projects are saved as .xmpp files and automations can be exported as .xmpa files, both XML-based and vulnerable to XXE injection. Sending a crafted .xmpp or .xmpa file to a user, when opened/imported in ModbusPal 1.6b, will return the contents of any local files to a remote attacker.

Fastweb FASTgate 0.00.47 CSRF

An issue was discovered in Fastweb FASTgate 0.00.47 device. A Cross-site request forgery (CSRF) vulnerability allows remote attackers to hijack the authentication of users for requests that modify the configuration. This vulnerability may lead to Gues Wi-Fi activating, Wi-Fi password changing, etc.

Allok Video Splitter 3.1.1217

A buffer overflow vulnerability exists in Allok Video Splitter 3.1.1217, which allows an attacker to execute arbitrary code by copying the contents of a specially crafted file into the License Name field and clicking Register. This can be exploited to execute arbitrary code with the privileges of the user running the application.

Microsoft Windows FxCop 10/12 – XML External Entity Injection

FxCop is vulnerable to XML injection attacks allowing local file exfiltration and or NTLM hash theft. Tested in Windows 7 and Windows 10 download SDK it works in both. If you have the the particular SDK in question it is probably there but needs to be installed as it was for me.

PlaySMS sendfromfile.php Authenticated “Filename” Field Code Execution

This module exploits a code injection vulnerability within an authenticated file upload feature in PlaySMS v1.4. This issue is caused by improper file name handling in sendfromfile.php file. Authenticated Users can upload a file and rename the file with a malicious payload. This module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

PlaySMS import.php Authenticated CSV File Upload Code Execution

This issue is caused by improper file contents handling in import.php (aka the Phonebook import feature). Authenticated Users can upload a CSV file containing a malicious payload via vectors involving the User-Agent HTTP header and PHP code in the User-Agent.

FTPShell Client 6.7 – Remote Buffer Overflow

A buffer overflow vulnerability exists in FTPShell Client 6.7, which could allow an attacker to execute arbitrary code on the target system. The vulnerability is due to a lack of proper validation of user-supplied data, which can result in a stack-based buffer overflow. An attacker can exploit this vulnerability by sending a specially crafted FTP request to the vulnerable server. Successful exploitation of this vulnerability could result in arbitrary code execution in the context of the application.

HWiNFO 5.82-3410 – Denial of Service

HWiNFO 5.82-3410 is vulnerable to a denial of service attack. An attacker can craft a malicious file containing a large amount of data and send it to the application. When the application attempts to process the file, it will crash and overwrite the EIP register. This can be exploited to execute arbitrary code.

DeviceLock Plug and Play Auditor 5.72 – Unicode Buffer Overflow (SEH)

DeviceLock Plug and Play Auditor 'DLPnpAuditor.exe' is vulnerable to a Unicode type of buffer overflow, when supplied a specially crafted textfile using the 'scan network' from file option. The buffer overload payload will get converted to unicode character encoding. Unicode support is used by applications for internationalization purposes allowing a consistent way to visually represent different character sets on most systems around the world.

Recent Exploits: