header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll 4.0.4.2512) / DirectSpeechRecognition Module (Xlisten.dll 4.0.4.2512) Remote Buffer Overflow Exploit

This is a remote buffer overflow exploit for the Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll 4.0.4.2512) and DirectSpeechRecognition Module (Xlisten.dll 4.0.4.2512). The exploit works regardless of boot.ini settings and can be executed remotely or by dragging an HTML file into the browser window. It has been tested against IE 6.

Use-After-Free Vulnerability in IOBluetoothHCIUserClient

This vulnerability exists in the IOBluetoothHCIUserClient of the IOKit framework in macOS. When creating a new IOBluetoothHCIUserClient, if the userclient doesn't take a reference to the owningTask, an attacker can pass a task port for another task, kill that task, and get the user client to use the freed task struct. This can lead to a use-after-free vulnerability, allowing an attacker to manipulate IOMemoryDescriptors and potentially execute arbitrary code.

Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll) / DirectSpeechRecognition Module (Xlisten.dll) Remote Buffer Overflow Exploit

This exploit targets the DirectSpeechSynthesis Module (XVoice.dll) and DirectSpeechRecognition Module (Xlisten.dll) in Microsoft Windows. By passing certain characters to the ModeName argument of the FindEngine method, the exploit overwrites the SEH handler, allowing for remote code execution. This exploit has been successfully tested on Windows 2000 SP4 with Internet Explorer 6. Under Windows XP, Internet Explorer crashes without warning the user first, but arbitrary code execution is still possible depending on loaded Unicode addresses in memory.

XOOPS Modules Horoscope

The vulnerability exists in the footer.php file of the Horoscope module in XOOPS, allowing an attacker to traverse the file system and access sensitive files by manipulating the 'xoopsConfig[root_path]' parameter. This can lead to unauthorized access, information disclosure, and potential remote code execution.

Privilege Escalation in HP TouchSmart Calendar Service

HP Calendar Service uses weak insecure permissions settings on its files/directory as the 'Everyone' group has full access on it. Allowing low privileged users to execute arbitrary code in the security context of ANY other users with elevated privileges on the affected system.

XOOPS Module TinyContent Remote File Inclusion

This vulnerability allows an attacker to include remote files on the server by manipulating a parameter in the URL. The specific vulnerable file is 'spaw_control.class.php' located in the 'admin/spaw' directory of the TinyContent module in XOOPS. By setting the 'spaw_root' parameter to a remote file location, the attacker can execute malicious code on the server.

Windows x86 (all versions) NDISTAPI privilege escalation (MS11-062)

An elevation of privilege vulnerability exists in the NDISTAPI.sys component of the Remote Access Service NDISTAPI driver. The vulnerability is caused when the NDISTAPI driver improperly validates user-supplied input when passing data from user mode to the Windows kernel. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode (i.e. with NT AUTHORITYSYSTEM privileges).

Recent Exploits: