header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GNU Barcode 0.99 – Memory Leak

GNU Barcode suffers from a memory leak vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the 'cmdline.c', which can be exploited to cause a memory leak via a specially crafted file. The vulnerability is confirmed in version 0.99. Other versions may also be affected.

GNU Barcode 0.99 – Buffer Overflow

The vulnerability is caused due to a boundary error in the processing of an input file, which can be exploited to cause a buffer overflow when a user processes e.g. a specially crafted file. Successful exploitation could allow execution of arbitrary code on the affected machine.

wityCMS 0.6.1 Persistent XSS on “Website’s name” field

A persistent/stored cross-site scripting (XSS) vulnerability in the "Website's name" field found in the "Settings" page under the "General" menu in Creatiwity wityCMS 0.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to admin/settings/general.

CyberLink PowerDVD CLAVSetting Module Arbitrary Remote Rewrite DoS

The CyberLink PowerDVD CLAVSetting Module (CLAVSetting.DLL 1.00.1829) allows an attacker to overwrite files with an empty one. This vulnerability is installed by default on Acer Travelmate series. The extension of the files being overwritten does not matter.

Joomla! extension JoomOCShop 1.0 – Cross site request forgery

This exploit allows an attacker to change user information and passwords in the Joomla! extension JoomOCShop 1.0. The attacker can modify the user's firstname, lastname, email, telephone, and fax. Another exploit allows the attacker to change the user's password.

Joomla! extension jCart for OpenCart 2.3.0.2 – Cross site request forgery

The Joomla! extension jCart for OpenCart 2.3.0.2 is vulnerable to cross site request forgery. This allows an attacker to change user information, change passwords, and change affiliate account information without proper authentication.

CloudMe Sync < 1.11.0 - Buffer Overflow (SEH) (DEP Bypass)

This exploit targets the CloudMe Sync software version 1.10.9 and allows for a buffer overflow, bypassing DEP. The exploit is a Python script that sends a specially crafted buffer to the CloudMe service, which should be running a bind shell on port 4444. Once the exploit is successful, the attacker can gain remote access to the victim machine. The exploit includes a register setup to defeat DEP by using VirtualProtect(). The script also generates a ROP chain using mona.py from www.corelan.be.

smbftpd 0.96 Proof of concept

The smbftpd 0.96 Proof of concept exploit allows an attacker to overwrite a GOT (Global Offset Table) entry with the address to BSS (Block Started by Symbol) and send shellcode, leading to remote code execution. The exploit takes advantage of a buffer overflow vulnerability in the smbftpd software.

Recent Exploits: