| Latest Exploits |
| Showing 'Latest Exploits' from 1 to 10|
| |Exim 4.91 Local Privilege Escalation Exim versions 4.87 through 4.91 suffer from a local privilege escalation vulnerability.
| |Netperf 2.6.0 Buffer Overflow Netperf version 2.6.0 suffers from a stack-based buffer overflow.
| |AROX School-ERP Pro Unauthenticated Remote Code Execution This Metasploit module exploits a command execution vulnerability in AROX School-ERP. "import_stud.php" and "upload_fille.php" do not have session control. Session start/check functions in Line 8,9,10 are disabled with slashes. Therefore...
| |HC10 HC.Server Service 10.14 Remote Invalid Pointer Write The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges,...
| |Microsoft Word (2016) Deceptive File Reference When a Microsoft Word ".docx" File contains a hyperlink to another file, it will run the first file it finds in that directory with a valid extension. But will present to the end user an extension-less file in its Security warning dialog...
| |Spring Security OAuth 2.3 Open Redirection Spring Security OAuth versions 2.3 prior to 2.3.6 suffer from open redirection vulnerabilities.
| |Microsoft Windows UAC Protection Bypass This script is a proof of concept to bypass the Microsoft Windows User Access Control (UAC) via SluiFileHandlerHijackLPE.
| |Aida64 6.00.5100 Log To CSV File Local SEH Buffer Overflow Topic: Aida64 6.00.5100 Log to CSV File Local SEH Buffer Overflow Risk: High Text:#!/usr/bin/python # # Exploit : Aida64 6.00.5100 Log to CSV File Local SEH Buffer Overf...
| |RedwoodHQ 2.5.5 Authentication Bypass RedwoodHQ version 2.5.5 suffers from an authentication bypass vulnerability.
| |Clever Dog Smart Camera DOG-2W / DOG-2W-V4 File Disclosure / Backdoor Clever Dog Smart Camera types DOG-2W and DOG-2W-V4 suffer from file disclosure, default telnet backdoor credential, and insecure transit vulnerabilities.
| 1 2 3 4 5 6 7 8 9 10 Older » |