header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft IIS WebDav ScStoragePathFromUrl Overflow

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with 'If: <http://' in a PROPFIND request, as exploited in the wild in July or August 2016.

Stack-based Buffer Overflow in mkvparser::AudioTrack::AudioTrack and mkvparser::VideoTrack::VideoTrack

During EBML node parsing, the EBML element_size is used unvalidated to allocate a stack buffer to store the element contents. This can result in memory corruption and potential remote-code-execution in the mediaserver process.

A-shop <=0.70 Multiple vulnerabilities

There are multiple vulnerabilities in A-shop <=0.70. One of the vulnerabilities is a file deletion vulnerability where an attacker can delete any file on the server by exploiting the 'filebrowser.asp' script. Another vulnerability is SQL injection which can be exploited in various areas of the application.

Vulnerability in MsMpEng

The MsMpEng service in Windows is remotely accessible without authentication, allowing attackers to exploit vulnerabilities in the service. This includes accessing mpengine by sending emails, visiting links, and other methods. The vulnerabilities in MsMpEng are severe due to the privilege, accessibility, and ubiquity of the service. The core component responsible for scanning and analysis, called mpengine, is a complex attack surface accessible to remote attackers. The NScript component in mpengine evaluates JavaScript code, making it highly privileged and unsandboxed.

phpBB Module SupaNav 1.0.0 (link_main.php) Remote File Inclusion Vulnerability

The vulnerability exists in the phpBB Module SupaNav 1.0.0 in the link_main.php file. The issue is caused by the lack of proper input validation in the phpbb_root_path parameter, allowing an attacker to include arbitrary files from a remote server. By exploiting this vulnerability, an attacker can execute malicious code or gain unauthorized access to the target system.

AstKilla2.c

This exploit targets an open port 2000/TCP which is commonly found in Asterisk machines. The exploit allows an attacker to execute arbitrary code on the target machine. It takes advantage of a vulnerability in the chan_skinny module, which is enabled by default. The exploit sends a register message to the target machine, which triggers the vulnerability and allows the attacker to execute code.

Recent Exploits: