header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mobatek MobaXterm 12.1 – Buffer Overflow (SEH)

SEH based Buffer Overflow in the Username field of a valid session. This exploit generates a malicious MobaXterm sessions file. When the user double clicks in the session, the shellcode is going to be executed. You need to adapt the exploit to your current OS Windows version.

Duplicate-Post 3.2.3 – Persistent Cross-Site Scripting

This vulnerability is in the validation mode and is located in the plugin management panel. The vulnerability allows an attacker to inject malicious script code in various fields, such as 'Title prefix', 'Title suffix', 'Increase menu order by', and 'Do not copy these fields'. By saving the changes, the payload will execute.

ABRT sosreport Privilege Escalation

This module attempts to gain root privileges on RHEL systems with a vulnerable version of Automatic Bug Reporting Tool (ABRT) configured as the crash handler. `sosreport` uses an insecure temporary directory, allowing local users to write to arbitrary files (CVE-2015-5287). This module uses a symlink attack on `/var/tmp/abrt/cc-*$pid/` to overwrite the `modprobe` path in `/proc/sys/kernel/modprobe`, resulting in root privileges. Waiting for `sosreport` could take a few minutes. This module has been tested successfully on: abrt 2.1.11-12.el7 on RHEL 7.0 x86_64; and abrt 2.1.11-19.el7 on RHEL 7.1 x86_64.

WftpdExpPro_HeapPoC.py

This is a proof of concept (PoC) exploit for a heap overflow vulnerability in the WFTPD Explorer Pro 1.0 software. The exploit allows an attacker to overwrite a register in the application's memory, causing an access violation (c0000005). The exploit uses a crafted payload to trigger the vulnerability.

SpotIE Internet Explorer Password Recovery 2.9.5 – ‘Key’ Denial of Service (DoS)

This exploit allows an attacker to cause a denial of service (crash) in SpotIE Internet Explorer Password Recovery 2.9.5. By providing a long string as the 'Key' parameter, the application crashes. This vulnerability can be exploited by running a Perl script provided by the author and following the steps outlined in the script.

Recent Exploits: