header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Google Invisible RECAPTCHA 3 – Spoof Bypass

This tool allows a user to bypass Version 3 of Google's Invisible RECAPTCHA by creating a spoofed web app that leverages the same RECAPTCHA, by providing the victims site key. What makes a site vulnerable? 1. They are using Version 3 of Google's Invisible RECAPTCHA 2. They allow the site key to be used on 'localhost'. However, while currently untested you could try adding the DNS name of the target you are attacking and try resolving it to 127.0.0.1 in your hosts file. NOTE: Exploit users need to have a functional understanding of both Python and JavaScript to make the necessary changes to run this exploit.

XCMS LFI & RCE Exploit

This exploit allows an attacker to perform local file inclusion and remote code execution on the XCMS version 1.82. The exploit involves manipulating the 'pg' parameter in the index.php file to access sensitive files on the server and execute arbitrary code. The exploit also mentions a hash disclosure vulnerability that allows an attacker to access user hashes. To achieve RCE, the attacker needs to upload an image with a PHP code binded and then use the LFI vulnerability to execute the code.

SkyFex Client 1.0 “Start()” Method Remote Stack Overflow

The SkyFex Client 1.0 software is vulnerable to a remote stack overflow exploit in the "Start()" method. An attacker can exploit this vulnerability by providing specially crafted input to the method, causing a stack overflow and potentially allowing the execution of arbitrary code. This vulnerability can be exploited remotely without authentication. The vulnerability affects version 1.0.2.77 of the SkyFexClient.ocx file. The exploit has been tested on Windows XP Professional SP2 with Internet Explorer 7.

Recent Exploits: