header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer 11 CMarkup::DestroySplayTree Use-After-Free

This exploit targets Internet Explorer 11 and specifically the CMarkup::DestroySplayTree function. It causes a use-after-free vulnerability, leading to an access violation exception. This vulnerability allows an attacker to execute arbitrary code or crash the application.

Ghostscript Type Confusion Arbitrary Command Execution

This module exploits a type confusion vulnerability in Ghostscript that can be exploited to obtain arbitrary command execution. This vulnerability affects Ghostscript version 9.21 and earlier and can be exploited through libraries such as ImageMagick and Pillow.

Remote MySQL DOS (Integer Overflow)

This is a proof of concept exploit code for CVE-2017-3599, a vulnerability in MySQL that allows for a remote denial of service attack. The exploit code creates a packet with specific values that trigger the vulnerability and crash the MySQL server. The vulnerability occurs when the server receives a login request packet with a length value that exceeds the maximum allowed value, resulting in an integer overflow. By sending a specially crafted packet, an attacker can cause the server to crash, denying access to legitimate users.

Security Issues in Alerton Webtalk

Vulnerabilities were identified in the Alerton Webtalk Software supplied by Alerton. These vulnerabilities allow unauthenticated users to access password hashes and authenticated users to execute commands as the root user on the underlying server. The password hashes are accessible via a file in the document root of the 'webtalk' user. The command injection vulnerability allows an attacker with the 'configure webtalk' permission to execute commands as the root user.

Emby MediaServer 3.2.5 Directory Traversal File Disclosure Vulnerability

The vulnerability allows an attacker to disclose the contents of arbitrary files via directory traversal attacks. The issue exists in the 'swagger-ui' object in SwaggerService.cs file. Input passed to this object is not properly verified before being used to load resources. The vulnerability affects multiple versions of Emby MediaServer, with different affected platforms for each version.

Memory Corruption Vulnerability in Internet Explorer

There is a memory corruption vulnerability in Internet Explorer. The crash happens in CStyleSheetArray::BuildListOfMatchedRules while attempting to read memory outside of the bounds of the object pointed by eax. If that read is successful and attacker-controlled address is read into edi, this down the line leads to a write at the attacker controlled address in CStyleSheetArray::BuildListOfProbableRules. Thus it might be possible to turn the issue into code execution.

ErraticGopher Exploit

The ErraticGopher exploit is a python version of the ErraticGopher exploit with some modifications. It exploits a memory corruption vulnerability (Heap Overflow) in the Windows DCE-RPC Call MIBEntryGet. By redirecting the execution to the iprtrmgr.dll library, it overwrites a return address and the SEH handler stored in the stack, allowing the control of execution flow to disable DEP and jump to the shellcode as SYSTEM user.

Recent Exploits: