header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

xRadio 0.95b (.xrl) Local Buffer Overflow (SEH)

xRadio is affected by a stack-based buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successful exploitation of the vulnerability allows an attacker to execute arbitrary code. Other versions are also affected but have a different trigger.

Android init Local Root Exploit

This is a local root exploit for Android 1.x/2.x. It copies files from sdcard to /sqlite_stmt_journals/exploid and runs them. It can also use /data/local/tmp if available. The exploit invokes hotplug by clicking Settings->Wireless->{Airplane,WiFi etc} or using USB keys. This exploit requires /etc/firmware directory and will only run on real devices, not inside the emulator.

Path Disclosure in Redaxscript

The vulnerability exists due to failure in the "/templates/default/index.php" script, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root directory and other potentially sensitive information.

PMB Services <= 3.4.3 Remote SQL Injection

This exploit allows an attacker to execute remote SQL injection in PMB Services version 3.4.3 or below. PMB Services is a free Integrated Library management System. The vulnerability can be exploited by an attacker to gain unauthorized access to the database and potentially retrieve or modify sensitive information.

WebAlbum <= 2.02pl Remote Command Execution

This exploit allows an attacker to execute arbitrary shell commands on the target server by exploiting a vulnerability in the WebAlbum <= 2.02pl software. The vulnerability occurs due to the lack of sanitization of user input in the 'skin2' cookie parameter. By injecting malicious shell commands into the cookie, an attacker can execute arbitrary commands on the target server. This exploit works when the 'magic_quotes_gpc' setting is turned off. The exploit requires the attacker to have knowledge of the target server's IP/hostname, the path to the WebAlbum installation, and a shell command to execute. Various options are available for specifying a different port or using a proxy.

WM Downloader 3.1.2.2 2010.04.15 (.m3u) Buffer Overflow + DEP Bypass

Buffer overflow vulnerability in WM Downloader 3.1.2.2 allows remote attackers to execute arbitrary code via a long string in an .m3u file, triggering a stack-based buffer overflow, and bypassing DEP protections.

XHP CMS <= 0.5 remote command execution

This exploit allows an attacker to execute arbitrary commands on a target server running XHP CMS version 0.5 or lower. The attacker can upload a PHP file using the FileManager plugin and then execute commands through it. The vulnerability exists in the FileManager plugin's manager.php and standalonemanager.php files.

Recent Exploits: