header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CyberLink LabelPrint 2.5 Stack Buffer Overflow

This module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).

Prototype Poisoning in JavaScriptCore

The vulnerability allows an attacker to create an array with a Proxy object in the prototype chain by exploiting the 'setPrototypeDirect' method in JavaScriptCore. By setting the prototype of an array to a Proxy object, the method 'switchToSlowPutArrayStorage' or 'haveABadTime' is called, which transitions the array to a SlowPutArrayStorage array.

EDraw Flowchart ActiveX Control (EDImage.ocx v. 2.0.2005.1104) “HttpDownloadFile()” Insecure Method

The vulnerability allows an attacker to download and execute arbitrary files on a targeted system using the 'HttpDownloadFile()' method in EDraw Flowchart ActiveX Control (EDImage.ocx v. 2.0.2005.1104). By convincing a user to open a specially crafted web page, an attacker can execute arbitrary code on the system with the privileges of the user.

DM Guestbook <= 0.4.1 Multiple Local File Include Vulnerabilities

The DM Guestbook version 0.4.1 is vulnerable to multiple local file inclusion vulnerabilities. An attacker can exploit these vulnerabilities by including arbitrary files from the system, such as /etc/passwd, by manipulating the 'lng' parameter in various PHP scripts. This allows an attacker to view sensitive information and potentially gain unauthorized access to the system.

Scribe <= 0.2 Remote PHP Code Execution

When registering a new user in Scribe <= 0.2, a file with the username is created in the /regged/ directory. The file contains the username. An attacker can exploit this by injecting PHP code in the username field during registration, which will be executed on the target server when accessing the generated file.

HP Intelligent Management Java Deserialization RCE

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebDMDebugServlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM.

Recent Exploits: