header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Icecream Apps Local Privilege Escalation

The default installation directory for Icecream Ebook Reader, Icecream Screen Recorder, and Icecream Slideshow Maker have weak folder permissions that grant EVERYONE change/modify privileges. This allows an attacker to execute their own code under any other user running the application.

Internet Explorer 11 Use After Free

This exploit allows an attacker to execute arbitrary code in the context of the user running Internet Explorer. The vulnerability occurs due to a use-after-free condition in the MSHTML component of Internet Explorer. By manipulating memory objects, an attacker can corrupt the program's memory and execute malicious code. This exploit has been tested on Windows 7 (x64) with Internet Explorer version 11.0.9600.18482.

Exper EWM-01 ADSL/MODEM Unauthenticated Remote DNS Change Exploit

The vulnerability exist in the web interface, which is accessible without authentication. Once modified, systems use foreign DNS servers, which are usually set up by cybercriminals. Users with vulnerable systems or devices who try to access certain sites are instead redirected to possibly malicious sites. Modifying systems' DNS settings allows cybercriminals to perform malicious activities like steering unknowing users to bad sites, replacing ads on legitimate sites, controlling and redirecting network traffic, and pushing additional malware.

Battle.Net 1.5.0.7963 Local Privilege Escalation

Battle.Net installs with weak folder permissions granting any built-in user account with full permission to the contents of the directory and its subfolders. This allows an attacker an opportunity for their own code execution under any other user running the application.

Jobberbase Vulnerabilities

1) Local path disclosure - changing a variable to an array can reveal the local path where the application is installed. 2) Open redirect - the 'Referer' header can be manipulated to redirect to any URL. 3) Reflected XSS in username and search fields. 4) Persistent XSS on admin backend homepage and in category name. 5) Unrestricted file upload allows uploading any file type. 6) Code execution race condition during file upload. 7) SQL injection in the 'days_behind' parameter of the getJobs API.

Recent Exploits: