header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nsauditor Local SEH Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in Nsauditor software. By sending a specially crafted payload, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program. This can lead to remote code execution and potentially compromise the system. The exploit has been tested on Windows XP SP3.

Remote Buffer Overflow Exploit for Kerio MailServer 5.6.3

This exploit allows an attacker to remotely execute arbitrary code on Kerio MailServer 5.6.3. It requires valid authentication details, but can be used to enumerate valid accounts using the 'RCPT TO' command. A dictionary attack can be used to obtain a large number of accounts with weak passwords.

Safari Proxy Object Type Confusion

This module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The JIT region is then replaced with shellcode which loads the second stage. The second stage exploits a logic error in libxpc, which uses command execution via the launchd's "spawn_via_launchd" API (CVE-2018-4404).

Ax Developer CMS 0.1.1 (index.php module) Local File Inclusion Vulnerability

The Ax Developer CMS version 0.1.1 is vulnerable to local file inclusion. An attacker can exploit this vulnerability by manipulating the 'module' parameter in the index.php file to include arbitrary local files, such as sensitive system files like /etc/passwd. This can lead to unauthorized access to sensitive information.

Zortam MP3 Media Studio Version 24.15 Exploit (SEH)

This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in Zortam MP3 Media Studio Version 24.15. By creating a specially crafted payload and pasting it into the select text field, an attacker can gain a shell on port 4444.

Responsive FileManager 9.13.4 – Multiple Vulnerabilities

An arbitrary file read vulnerability exists in Responsive FileManager version 9.13.4. This vulnerability can be exploited by an attacker to read sensitive files on the server by using a path traversal technique. By manipulating the 'path' parameter in the 'get_file' action of ajax_calls.php, an attacker can traverse directories and access files outside of the intended directory. This can lead to unauthorized access to sensitive information such as configuration files or user credentials.

Recent Exploits: