LiquidWorm

790 exploits Active since Jun 2006
EIP-2026-116960 EXPLOITDB text WRITEUP
Cimetrics BACstac 6.2f - Local Privilege Escalation
EIP-2026-116817 EXPLOITDB text WRITEUP
Asseco SEE iBank FX Client 2.0.9.3 - Local Privilege Escalation
CVE-2017-9644 EXPLOITDB HIGH text WRITEUP
ALC WebCTRL <6.5 - Code Injection
An Unquoted Search Path or Element issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An unquoted search path vulnerability may allow a non-privileged local attacker to change files in the installation directory and execute arbitrary code with elevated privileges.
CVSS 7.0
EIP-2026-116891 EXPLOITDB text WRITEUP
BitRaider Streaming Client 1.3.3.4098 - Local Privilege Escalation
EIP-2026-116772 EXPLOITDB text WRITEUP
Aloaha Credential Provider Monitor 5.0.226 - Local Privilege Escalation
EIP-2026-117125 EXPLOITDB text WRITEUP
Electronic Arts Origin Client 9.5.5 - Multiple Privilege Escalation Vulnerabilities
CVE-2009-0450 EXPLOITDB python WORKING POC
BlazeVideo HDTV Player <3.5 - Buffer Overflow
Stack-based buffer overflow in BlazeVideo HDTV Player 3.5 and earlier allows remote attackers to execute arbitrary code via a long string in a playlist (aka .plf) file.
EIP-2026-116394 EXPLOITDB text SUSPICIOUS
TECO SG2 FBD Client 3.51 - '.gfb' Overwrite Buffer Overflow (SEH) (PoC)
EIP-2026-116395 EXPLOITDB text WRITEUP
TECO TP3-PCLINK 2.1 - '.tpc' Handling Buffer Overflow (PoC)
EIP-2026-116393 EXPLOITDB text WRITEUP
TECO AP-PCLINK 1.094 - '.tpc' File Handling Buffer Overflow (PoC)
EIP-2026-116398 EXPLOITDB perl WORKING POC
TeraCopy 2.3 - 'default.mo' Language File Integer Overflow
EIP-2026-116276 EXPLOITDB text WORKING POC
Sony PC Companion 2.1 - 'Load()' Unicode Stack Buffer Overflow
EIP-2026-116277 EXPLOITDB python WORKING POC
SopCast 3.4.7 - 'sop://' URI Handling Remote Stack Buffer Overflow (PoC)
CVE-2012-5324 EXPLOITDB text WORKING POC
Tracker Software PDF-XChange <3.60.0128 - Buffer Overflow
Multiple buffer overflows in the Pdf Printer Preferences ActiveX Control in pdfxctrl.dll in Tracker Software PDF-XChange 3.60.0128 allow remote attackers to execute arbitrary code via a long string in the (1) sub_path parameter to the StoreInRegistry function or (2) sub_key parameter to the InitFromRegistry function.
EIP-2026-116313 EXPLOITDB python WORKING POC
Spotify 0.8.2.610 - search func Memory Exhaustion
EIP-2026-116261 EXPLOITDB perl WORKING POC
Soda PDF Professional 1.2.155 - '.pdf' / '.WWF' File Handling Denial of Service
EIP-2026-116273 EXPLOITDB text WORKING POC
Sony PC Companion 2.1 - 'Admin_RemoveDirectory()' Unicode Stack Buffer Overflow
EIP-2026-116252 EXPLOITDB text WORKING POC
SmartCode ServerX VNC Server ActiveX 1.1.5.0 - 'scvncsrvx.dll' Denial of Service
EIP-2026-116274 EXPLOITDB text WORKING POC
Sony PC Companion 2.1 - 'CheckCompatibility()' Unicode Stack Buffer Overflow
CVE-2018-10608 EXPLOITDB HIGH python WORKING POC
SEL AcSELerator Architect <2.2.24.0 - DoS
SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utilization. Restart of the application is required.
CVSS 7.5
EIP-2026-116275 EXPLOITDB text WORKING POC
Sony PC Companion 2.1 - 'DownloadURLToFile()' Unicode Stack Buffer Overflow
CVE-2014-10011 EXPLOITDB text WORKING POC
Trendnet Tv-ip422w - Memory Corruption
Stack-based buffer overflow in UltraCamLib in the UltraCam ActiveX Control (UltraCamX.ocx) for the TRENDnet SecurView camera TV-IP422WN allows remote attackers to execute arbitrary code via a long string to the (1) CGI_ParamSet, (2) OpenFileDlg, (3) SnapFileName, (4) Password, (5) SetCGIAPNAME, (6) AccountCode, or (7) RemoteHost function.
EIP-2026-116236 EXPLOITDB python WORKING POC
Serva 3.0.0 - HTTP Server Denial of Service
EIP-2026-116219 EXPLOITDB text WORKING POC
SAS Integration Technologies Client 9.31_M1 'SASspk.dll' - Stack Overflow
CVE-2014-4334 EXPLOITDB perl WORKING POC
Ubisoft Rayman Legends <1.3.140380 - Buffer Overflow
Stack-based buffer overflow in Ubisoft Rayman Legends before 1.3.140380 allows remote attackers to execute arbitrary code via a long string in the "second connection" to TCP port 1001.