header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nuke Mobile Entartainment <= (module_name) Local File Include Vuln

The vulnerability allows an attacker to include local files on the server by exploiting an insecure file inclusion function in the 'compatible.php' script. By manipulating the 'module_name' parameter, an attacker can access sensitive system files and potentially execute arbitrary code.

Uninitialized Kernel Stack Memory Disclosure in nt!NtQueryVolumeInformationFile

The nt!NtQueryVolumeInformationFile system call in Windows 10 (32/64-bit) discloses uninitialized kernel stack memory to user-mode clients. The vulnerability can be triggered by invoking the syscall against certain kernel objects. There are two types of leaks that can occur, both involving the output IO_STATUS_BLOCK structure. The first type is a 64-bit specific leak of 4 bytes of uninitialized kernel stack memory, caused by a mismatch in the size of NTSTATUS and PVOID on x64 platforms. The second type is when a completely uninitialized copy of IO_STATUS_BLOCK is passed down to the user-mode client, resulting in the disclosure of 8 kernel stack bytes on x86 systems and 16 bytes on x64 systems.

WordSmith 1.0 RC1 (config.inc.php) Remote File Inclusion

This exploit allows an attacker to include a remote file in the config.inc.php file of WordSmith 1.0 RC1. By providing a specially crafted URL with the '_path' parameter pointing to a malicious file, the attacker can execute arbitrary code on the vulnerable server.

Uninitialized Kernel Stack Memory Disclosure in nt!NtQueryAttributesFile

The nt!NtQueryAttributesFile system call invoked with paths of certain kernel objects discloses uninitialized kernel stack memory to user-mode clients. The bug results in the disclosure of 4 uninitialized kernel stack bytes.

SysGauge Pro v4.6.12 – Local Buffer Overflow (SEH)

The SysGauge Pro v4.6.12 software is vulnerable to a local buffer overflow vulnerability. By providing a specially crafted payload in the Customer Name and Unlock Key fields, an attacker can trigger a buffer overflow and potentially execute arbitrary code on the target system. The vulnerability has been tested on Windows XP Professional - SP3.

Buffer Overflow on DVD X Player Standard 5.5.3.9

The exploit involves a buffer overflow vulnerability in DVD X Player Standard version 5.5.3.9. By sending a specially crafted payload, an attacker can overwrite the SEH (Structured Exception Handler) to gain control of the program execution flow. This can lead to remote code execution and potential compromise of the system. The exploit has been tested on Windows XP SP3 x86.

Plugin Woocommerce CSV importer 3.3.6 – RCE – Unlink

The plugin Woocommerce CSV importer 3.3.6 allows any registered user to perform remote code execution. The vulnerability exists due to the lack of escaping in the $_POST['filename'] parameter. By sending a specially crafted request to the admin-ajax.php file, an attacker can unlink files on the server.

Recent Exploits: