header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MyVideoConverter Pro 3.14 Denial of Service

The exploit creates a malicious payload that causes a Denial of Service (DoS) by generating a local buffer overflow. The payload is written to a file called 'Evil.txt', which is then copied and pasted into the 'Copy and Paste Registration Code' field in the MyVideoConverter Pro software. When the user clicks 'ok', the software crashes.

PassFab Excel Password Recovery SEH Local Exploit

This exploit takes advantage of a vulnerability in PassFab Excel Password Recovery software version 8.3.1 running on Windows XP SP3. By providing specially crafted input, an attacker can trigger a buffer overflow and overwrite the Structured Exception Handler (SEH) to gain control of the program execution flow. This exploit replaces the SEH with a pop pop ret address in the SoftwareLog.dll module, allowing the execution of arbitrary code. The payload used in this example is a shellcode that opens the Windows calculator.

meBiblio 0.4.5 RFI

The meBiblio 0.4.5 script is vulnerable to a Remote File Inclusion (RFI) attack. The vulnerability exists in the index.php file, where the 'action' variable is not properly validated before being included in a PHP include() function. This allows an attacker to include a remote file from a malicious server, leading to remote code execution on the target system.

vm_map_copyin_internal vulnerability

The vm_map_copyin_internal function in vm_map.c in the kernel converts a region of a vm_map into copied in form, constructing a vm_map_copy structure representing the copied memory which can then be mapped into another vm_map. The function contains a while loop which walks through each of the vm_map_entry structures which make up the region to be copied and tries to append a copy of each in turn to a vm_map_copy structure. However, under certain circumstances, there is a non-blocking copy-on-write optimization that can be exploited.

Type Confusion and Memory Safety Issue in com.apple.iohideventsystem

The com.apple.iohideventsystem service on MacOS and iOS suffers from type confusion issues in the IOMIGMachPortCache, leading to out-of-bounds reads and type confusion. There is also a memory safety issue in _io_hideventsystem_unregister_record_service_changed_notification, where a CFRelease call is not balanced by a CFRetain. An attacker can exploit these issues by connecting to the service and calling io_hideventsystem_unregister_record_service_changed_notification twice.

xpc Mach Message Parsing Vulnerability

The xpc mach message parsing function in libxpc does not properly handle cases where the message has the MACH_MSGH_BITS_COMPLEX bit set but has a msgh_descriptor_count of 0. This can lead to memory corruption and potentially allow an attacker to execute arbitrary code.

XNU Copy-on-Write Memory Management Vulnerability

XNU has a vulnerability in its copy-on-write memory management mechanism. When creating copy-on-write copies of data between processes, the copied memory is not properly protected against later modifications by the source process, potentially leading to double-read exploits in the destination process. This vulnerability can also occur with file mappings, where the file contents may be mutated by the filesystem without informing the memory management subsystem, resulting in security bugs.

Recent Exploits: