LiquidWorm

790 exploits Active since Jun 2006
EIP-2026-119627 EXPLOITDB text WRITEUP
ACROS Security 0patch 2016.05.19.539 - '0PatchServicex64.exe' Unquoted Service Path Privilege Escalation
EIP-2026-119664 EXPLOITDB text WORKING POC
Wieland wieplan 4.1 - Document Parsing Java Code Execution Using XMLDecoder
EIP-2026-119672 EXPLOITDB text WORKING POC
CyberPower Systems PowerPanel 3.1.2 - XML External Entity Out-Of-Band Data Retrieval
EIP-2026-119430 EXPLOITDB html WORKING POC
SonicDICOM PACS 2.3.2 - Cross-Site Request Forgery (Add Admin)
EIP-2026-119415 EXPLOITDB text WORKING POC
Pelco VideoXpert 1.12.105 - Information Disclosure
EIP-2026-119154 EXPLOITDB text WORKING POC
Softek Barcode Reader Toolkit ActiveX 7.1.4.14 - 'SoftekATL.dll' Remote Buffer Overflow
CVE-2011-5155 EXPLOITDB c WORKING POC
Help & Manual 5.5.1 Build 1296 - Privilege Escalation
Untrusted search path vulnerability in Help & Manual 5.5.1 Build 1296 allows local users to gain privileges via a Trojan horse ijl15.dll file in the current working directory, as demonstrated by a directory that contains a .hmxz, .hmxp, .hmskin, .hmx, .hm3, .hpj, .hlp, or .chm file. NOTE: some of these details are obtained from third party information.
EIP-2026-117958 EXPLOITDB text WRITEUP
Spybot Search & Destroy 1.6.2 Security Center Service - Local Privilege Escalation
EIP-2026-117997 EXPLOITDB perl WORKING POC
TECO JN5 L510-DriveLink 1.482 - '.lf5' Overwrite Buffer Overflow (SEH)
EIP-2026-117998 EXPLOITDB perl WORKING POC
TECO SG2 LAD Client 3.51 - '.gen' Overwrite Buffer Overflow (SEH)
EIP-2026-117939 EXPLOITDB text WORKING POC
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Denial Of Service (DoS)
EIP-2026-117999 EXPLOITDB text WRITEUP
Telefonica O2 Connection Manager 3.4 - Local Privilege Escalation
CVE-2018-10619 EXPLOITDB HIGH text WRITEUP
RSLinx Classic <3.90.01 - Privilege Escalation
An unquoted search path or element in RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior may allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation.
CVSS 7.8
CVE-2011-5044 EXPLOITDB text WRITEUP
Sopcast - Access Control
SopCast 3.4.7.45585 uses weak permissions (Everyone:Full Control) for Diagnose.exe, which allows local users to execute arbitrary code by replacing Diagnose.exe with a Trojan horse program.
EIP-2026-118000 EXPLOITDB text WRITEUP
Telefonica O2 Connection Manager 8.7 - Service Trusted Path Privilege Escalation
CVE-2014-5453 EXPLOITDB text WRITEUP
UBI Uplay PC < 4.6.3208 - Access Control
Ubisoft Uplay PC before 4.6.1.3217 use weak permissions (Everyone: Full Control) for the program installation directory (%PROGRAMFILES%\Ubisoft Game Launcher), which allows local users to gain privileges via a Trojan horse file.
EIP-2026-118037 EXPLOITDB text WRITEUP
Ubisoft Uplay 5.0 - Insecure File Permissions Privilege Escalation
EIP-2026-118044 EXPLOITDB text WRITEUP
Valve Steam Client Application 1559/1559 - Local Privilege Escalation
EIP-2026-118099 EXPLOITDB text WRITEUP
WEG SuperDrive G2 12.0.0 - Insecure File Permissions
EIP-2026-118255 EXPLOITDB perl WORKING POC
Amaya Web Editor 11 - Remote Overwrite (SEH)
CVE-2006-6199 EXPLOITDB perl WORKING POC
Blazevideo Blaze Dvd - Memory Corruption
Stack-based buffer overflow in BlazeVideo BlazeDVD Standard and Professional 5.0, and possibly earlier, allows remote attackers to execute arbitrary code via a long filename in a PLF playlist.
EIP-2026-117832 EXPLOITDB text WRITEUP
Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path
EIP-2026-117760 EXPLOITDB text WRITEUP
Pelco VideoXpert 1.12.105 - Local Privilege Escalation
EIP-2026-117789 EXPLOITDB perl WORKING POC
PowerCHM 5.7 - 'hhp' Local Buffer Overflow
EIP-2026-117796 EXPLOITDB text WRITEUP
Privacyware Privatefirewall 7.0 - Unquoted Service Path Privilege Escalation