header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wireshark ASAN Build Static Out-of-Bounds Read Crash

A static out-of-bounds read vulnerability exists in Wireshark, specifically in the dissct_rsl_ipaccess_msg function in packet-rsl.c. By feeding a malformed file to tshark, an attacker can trigger a global buffer overflow, leading to a crash. The vulnerability can be observed in an ASAN build of Wireshark (current git master).

ASAN Crash due to Static Out-of-Bounds Read in Wireshark

The crash occurs in Wireshark's packet-zbee-zcl-general.c file during the dissection of a malformed file with tshark. It triggers a global buffer overflow error, leading to a read of 4 bytes at an out-of-bounds address.

Morovia Barcode ActiveX Professional 3.3 (build 1304) Arbitrary file overwrite

The exploit overwrites the system.ini file, potentially causing the PC to not restart. It affects Morovia Barcode ActiveX Professional 3.3 (build 1304) on Windows XP Professional SP2 with Internet Explorer 7.

Proof of Concept -> Hewlett Packard Stack Overflow in hpqvwocx.dll v1.0.0.309

This proof of concept demonstrates a stack overflow vulnerability in the hpqvwocx.dll version 1.0.0.309. The vulnerability allows an attacker to execute arbitrary code by clicking a button that triggers the OuCh() function.

Legend Perl IRC Bot Remote Code Execution

This module exploits a remote command execution on the Legend Perl IRC Bot. This bot has been used as a payload in the Shellshock spam last October 2014. This particular bot has functionalities like NMAP scanning, TCP, HTTP, SQL, and UDP flooding, the ability to remove system logs, and ability to gain root, and VNC scanning. Kevin Stevens, a Senior Threat Researcher at Damballa has uploaded this script to VirusTotal with a md5 of 11a9f1589472efa719827079c3d13f76.

Privilege Elevation in eTrust Antivirus Agent r8

eTrust Antivirus r8 is prone to a stack-based buffer overflow vulnerability. The vulnerable code is located at IN0CORE.DLL in the function QSIGetQueueID which internally calls QSIGetQuePath passing a fixed buffer in order to retrieve the queue path, no validation is done for the buffer size. Malicious users can modify the buffer through the file mapping with a long file path, triggering the stack-based buffer overflow.

Recent Exploits: