header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NXFilter v3.0.3 – Persistent & Reflected XSS

Persistent & reflected XSS entry points exist allowing arbitrary client side browser code execution on victims who click our infected linx or visit persistently stored XSS payloads. XSS strings seem to get filtered, yet we can defeat that using JS String.fromCharCode() functions.

Friendly 1.0d1 (friendly_path) Remote File Inclusion Vulnerabilities

The vulnerability allows an attacker to include a remote file by manipulating the 'friendly_path' parameter in the specified URLs. This can lead to remote code execution and unauthorized access to the server.

Heap-based out-of-bounds memory reads in FreeType

The vulnerability occurs in the handling of the 'cmap' (format 14) SFNT table in FreeType. It allows for heap-based out-of-bounds memory reads. The issue has been reproduced using the current version of freetype2 with a 64-bit build of the ftbench utility compiled with AddressSanitizer. Three proof-of-concept (POC) files triggering the conditions are attached.

Python 2.7 strop.replace() Integer Overflow

The Python 2.7 strop.replace() method suffers from an integer overflow that can be exploited to write outside the bounds of the string buffer and potentially achieve code execution. The issue can be triggered by performing a large substitution that overflows the arithmetic used in mymemreplace() to calculate the size of the new string.

GOLD PLAYER Local Exploit

This exploit allows an attacker to create a file called buffer.txt, open it in the Gold Player application, and gain control of a bind tcp port at 4444. The exploit involves executing a Python script, copying the contents of buffer.txt, and pasting them into the Gold Player application. The exploit has been tested on Windows 8.1 Pro and Windows 7 Ultimate.

Buffer Overflow in Spetnik TCPing 2.1.0

If TCPing is called with a specially crafted CL argument, it causes an exception and overwrites the Pointers to next SEH record and SEH handler with a buffer and malicious shellcode. TCPing is not compiled with SafeSEH, so an arbitrary code execution can be achieved on the victim's system.

Recent Exploits: