header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

lastore-daemon D-Bus Privilege Escalation

This module attempts to gain root privileges on Deepin Linux systems by using lastore-daemon to install a package. The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user in the sudo group to install arbitrary system packages without providing a password, resulting in code execution as root. By default, the first user created on the system is a member of the sudo group. This module has been tested successfully with lastore-daemon version 0.9.53-1 on Deepin Linux 15.5 (x64).

Easy File Sharing Web Server 7.2 – ‘UserID’ Remote Buffer Overflow (DEP Bypass)

This exploit takes advantage of a buffer overflow vulnerability in Easy File Sharing Web Server version 7.2. By sending a specially crafted 'UserID' parameter, an attacker can execute arbitrary code on the target system. The exploit bypasses DEP (Data Execution Prevention) and allows the execution of arbitrary shellcode. The exploit has been tested on Windows 7 Enterprise (x86) with Service Pack 1.

Buffer Overflow(SEH) on Allok Video to DVD Burner2.6.1217

The exploit code creates a file called 'Evil.txt' and copies its content into the License Name field of the Allok Video to DVD Burner software. This triggers a buffer overflow vulnerability in the software, allowing the attacker to execute arbitrary code.

Xitami Web Server 2.5 (If-Modified-Since) 0day Remote Buffer Overflow Exploit

This is a remote buffer overflow exploit for Xitami Web Server 2.5. It takes advantage of the If-Modified-Since header to trigger the vulnerability and execute arbitrary code. The exploit was discovered by Krystian Kloskowski (h07) and tested on Xitami 2.5c2 on Windows XP SP2 Polish. The shellcode used in this exploit is the Windows Execute Command (calc) from metasploit.com.

Ncomputing vSpace Pro v10 and v11 – Directory Traversal Vulnerability

It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with …/ or … or …./ or …. as a directory-traversal pattern to TCP port 8667. An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.

Recent Exploits: