header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FULL ASLR AND DEP BYPASS USING ASM.JS JIT SPRAY (CVE-2017-5375)

This exploit bypasses Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) using the ASM.JS JIT Spray technique. It targets Firefox version 50.0.1 and exploits a vulnerability (CVE-2016-9079) in the Tor Browser.

Schneider Electric Pelco VideoXpert Missing Encryption Of Sensitive Information

The software transmits sensitive data using double Base64 encoding for the Cookie 'auth_token' in a communication channel that can be sniffed by unauthorized actors or arbitrarily be read from the vxcore log file directly using directory traversal attack resulting in authentication bypass / session hijacking.

Schneider Electric Pelco VideoXpert Core Admin Portal Directory Traversal

The Pelco VideoXpert Core Admin Portal is vulnerable to directory traversal, allowing an unauthenticated attacker to view arbitrary files within the context of the web server.

Schneider Electric Pelco Sarix/Spectra Cameras Root Remote Code Execution

The affected cameras suffer from authenticated remote code execution vulnerability. The POST parameter 'enable_leds' located in the update() function called via the GeneralSetupController.php script is not properly sanitised before being used in writeLedConfig() function to enable led state to on or off. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges using a specially crafted request and escape sequence to system shell.

Nessus Vulnerability Scanner 3.0.6 ActiveX deleteReport() 0day Remote Delete File Exploit

This exploit targets the deleteReport() function in the Nessus Vulnerability Scanner 3.0.6 ActiveX control. By passing a relative path to the deleteReport() function, an attacker can delete arbitrary files on the system. The exploit was discovered by Krystian Kloskowski (h07) and has been tested on Nessus 3.0.6 running on Internet Explorer 6 on Windows XP SP2 (Polish). This exploit is provided for demonstration purposes only.

Crystal Player 1.98 Playlist(.mls) File Local Buffer Overflow Exploit

The exploit creates a crafted .mls file which triggers a buffer overflow in Crystal Player 1.98. This vulnerability allows an attacker to overwrite the EIP and EBP registers, leading to a Denial of Service (DOS) and potential library destruction upon successful exploitation. The exploit adds a user 'root' with password 'root' to the operating system. It has been tested on x86 Vista Enterprise Edition.

Recent Exploits: