header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Free IP Switcher 3.1 – Denial of Service (PoC)

The Free IP Switcher version 3.1 is vulnerable to a denial of service (DoS) attack. By sending a specially crafted payload, an attacker can cause the application to crash, resulting in a denial of service condition. This proof of concept (PoC) exploit triggers the crash by opening the Free IP Switcher application and performing specific actions, including pasting malicious content from a clipboard.

AirMore 1.6.1 Remote Denial of Service (DoS) & System Freeze

This exploit allows an attacker to remotely cause a denial of service (DoS) and freeze the system of AirMore version 1.6.1. By sending a specially crafted request to the server, the attacker can trigger a DoS condition and cause the system to freeze.

exacqVision ESM 5.12.2 – Privilege Escalation

exacqVision ESM 5.12.2 suffers from Privilege Escalation due to insecure file permissions. By default, the Authenticated Users group has the modify permission to ESM folders/files, allowing a low privilege account to rename the enterprisesystemmanager.exe file and replace it with a malicious file that can give system level privileges. Restarting the computer triggers the execution of the malicious file.

Bcoos Multiple Vulnerabilities

Bcoos is a CMS coming from the cores of E-Xoops. The vulnerabilities include Local File Inclusion (Remote Code Execution). The code snippets provided show the areas of the code where the vulnerabilities exist.

Rukovoditel Project Management CRM 2.4.1 – XSS Vulnerability (DOM BASED)

The Rukovoditel Project Management CRM 2.4.1 version is vulnerable to a DOM based XSS vulnerability. By manipulating the URL and injecting malicious code, an attacker can execute arbitrary scripts in the victim's browser.

dirty_sock: Privilege Escalation in Ubuntu (via snapd)

This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these values.

Race Condition in Binder

There is a race condition between the direct reclaim path and the munmap() syscall in the binder subsystem. The munmap() syscall enters binder through the binder_vm_ops close handler, while the direct reclaim path enters binder through the binder_shrinker. This race condition can lead to potential vulnerabilities.

Recent Exploits: