header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Disk Savvy Enterprise 9.0.32 Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in Disk Savvy Enterprise 9.0.32. It allows an attacker to execute arbitrary code with NT AUTHORITYSYSTEM privileges. The exploit does not require authentication. The IP address, shellcode, and bytes can be adjusted as needed. It has been tested on Windows 7 x86 Enterprise SP1.

Disk Sorter Enterprise 9.0.24 Buffer Overflow Exploit

The exploit allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges in Disk Sorter Enterprise version 9.0.24. The exploit does not require authentication and can be triggered by sending a specially crafted request. The exploit has been tested on Windows 7 x86 Enterprise SP1.

Dup Scout Enterprise 9.0.28 Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in Dup Scout Enterprise 9.0.28. It allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges without authentication. The exploit has been tested on Windows 7 x86 Enterprise SP1. The payload size is 308 bytes.

Sync Breeze Enterprise 8.9.24 Buffer Overflow Exploit

This exploit targets Sync Breeze Enterprise version 8.9.24. It allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges on the target system. The exploit does not require authentication and can be used without a valid password. The payload size is 308 bytes.

Disk Pulse Enterprise 9.0.34 Buffer Overflow Exploit

This exploit targets Disk Pulse Enterprise 9.0.34 and allows an attacker to achieve NT AUTHORITYSYSTEM privileges without authentication. The exploit requires adjusting the IP address, shellcode, and bytes. It has been tested on Windows 7 x86 Enterprise SP1.

Windows Animated Cursor Stack Overflow Exploit

This is an exploit for the Windows Animated Cursor Stack Overflow Vulnerability. The vulnerability allows an attacker to execute arbitrary code by creating a specially crafted animated cursor file. This exploit takes advantage of the vulnerability to execute a reverse shell payload.

Windows Firewall Control Unquoted Service Path Privilege Escalation

Windows Firewall Control lacks quotes in filepath, allowing a potential vector of privilege escalation attack. The local attacker can insert an executable file in the path of the service, which will be run with elevated privileges upon service restart or system reboot.

Netgear Genie 2.4.32 Unquoted Service Path Elevation of Privilege

Netgear Genie installs a service called 'NETGEARGenieDaemon' with an unquoted service path running with SYSTEM privileges. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

highsecu.ico – Microsoft GDI+ Integer division by zero flaw handling .ICO files

This exploit is related to the Microsoft GDI+ library, specifically in the handling of .ICO files. It involves an integer division by zero flaw, which can lead to a denial of service or potentially arbitrary code execution. The exploit is available in the provided link.

Recent Exploits: