header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Newline Injection in URL Redirection

The vulnerability allows an attacker to redirect URLs to a malicious website by injecting newlines in the URL. This can be achieved by using the %0a character, which represents a newline. By appending the malicious website after the newline character, the attacker can redirect users to the malicious site.

ClamAV ClamBC Exploit

This exploit targets a buffer overflow vulnerability in ClamAV's ClamBC component. The lack of documentation and availability of source code led to the development of this exploit. By sending specially crafted input to the ClamBC component, an attacker can trigger a buffer overflow and potentially execute arbitrary code.

EDB Download

This is a link to download the exploit database (EDB) from GitLab. The exploit database contains a collection of security exploits and vulnerabilities that can be used for testing and research purposes.

RDP pool_spray Remote Code Execution

This exploit allows remote code execution on a target machine by leveraging a vulnerability in the RDP protocol. By sending a specially crafted payload, an attacker can overwrite memory and execute arbitrary code on the target system. This exploit has been tested and found to be successful on Windows 7 systems.

Studio 5000 Logix Designer 30.01.00 – ‘FactoryTalk Activation Service’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

BartVPN 1.2.2 – ‘BartVPNService’ Unquoted Service Path

The BartVPNService in BartVPN 1.2.2 has an unquoted service path vulnerability. This allows an attacker with local system privileges to potentially execute arbitrary code with elevated privileges by placing a malicious executable file in the root of the system drive.

Recent Exploits: