header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mocha W32 LPD Remote Buffer Overflow Vulnerability

Mocha W32 LPD is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data. Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.

IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Denial of Service

This exploit targets the PrecisionID Barcode ActiveX control version 1.9 in Internet Explorer 6. By sending a specially crafted input, an attacker can cause a denial of service condition. The exploit has been tested on Windows XP Professional SP2 with all patches applied and Internet Explorer 6. Other software that uses this ActiveX control may also be vulnerable.

4images 1.9 – Remote Command Execution (RCE)

A vulnerability in 4images 1.9 allows an authenticated administrator user to execute arbitrary code on the server by uploading a malicious template. To exploit the vulnerability, an attacker must first login as an administrator user, then browse to General -> Edit Templates -> Select Template Pack -> default_960px -> Load Theme. The attacker then selects the template categories.html and inserts a reverse shell payload. After clicking Save Changes, the attacker browses to http://host/4images/categories.php?cat_id=3D1 and a reverse shell is established.

IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Remote Arbitrary File Overwrite

This exploit allows a remote attacker to overwrite the system.ini file on a vulnerable system. It is triggered by a malicious user clicking a button on a webpage containing the exploit code. The exploit code is written in VBScript and is triggered by a malicious user clicking a button on a webpage containing the exploit code. The exploit code is written in VBScript and is triggered by a malicious user clicking a button on a webpage containing the exploit code. The exploit code is written in VBScript and is triggered by a malicious user clicking a button on a webpage containing the exploit code. The exploit code is written in VBScript and is triggered by a malicious user clicking a button on a webpage containing the exploit code.

phpMyChat Multiple Local File-Include Vulnerabilities

phpMyChat is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input. Exploiting these issues may allow an unauthorized user to view files and execute local scripts. phpMyChat Plus 1.9 and prior versions are vulnerable to these issues; other versions may also be affected.

IDevSpot BizDirectory Multiple Cross-Site Scripting Vulnerabilities

IDevSpot BizDirectory is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data. An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow an attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: