header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DoS – SPECTral Personal SMTP Server <= 0.4.2 b 338

This script performs a Denial of Service (DoS) attack on the SPECTral Personal SMTP Server. It sends multiple requests to the server, overloading it and causing it to become unresponsive. The attack is performed by sending specially crafted SMTP commands to the server.

r00t exploit for invscout bug

This exploit takes advantage of the invscout bug reported by Idefense labs. It allows an attacker to gain root access by exploiting a vulnerability in the invscout software. The exploit script automates the process of gaining root access. The exploit involves copying the ksh binary to /tmp, changing its ownership to root:system, giving it execute and setuid permissions, and then executing it. This allows the attacker to gain root access. The exploit was coded by ri0t and can be found on www.ri0tnet.net.

fuzzylime cms <= 3.03a local inclusion / arbitrary file corruption poc

There are three vulnerabilities in the fuzzylime cms version <= 3.03a. The first vulnerability (LFI) can be exploited by accessing the confirm.php file and using the 'e' and 'list' parameters to include arbitrary files. The second vulnerability (LFI) can be exploited by accessing the display.php file and using the 'template' parameter to include arbitrary files. The third vulnerability (LFC) can be exploited by accessing the display.php file and using the 'usecache' and 's' parameters to corrupt local files.

Firefox Profile Directory Arbitrary File Write

This exploit allows anonymous users to gain administrator rights by placing the exe file in the Firefox profile directory and browsing a site with phpbb. It replaces a specific string in the cookies.txt file to modify user privileges. If something goes wrong, clearing cookies is recommended.

MacOS X[CF_CHARSET_PATH]: local root exploit.

This is a local root exploit for MacOS X that exploits a vulnerability in the CF_CHARSET_PATH. It allows an attacker to gain root privileges on the system. The exploit takes advantage of a buffer overflow in the /usr/bin/su binary. The user must press ENTER at the "Password: " prompt for the exploit to work.

TBDev – Cross Site Scripting and HTML Injection Vulnerabilities

The TBDev software is vulnerable to Cross Site Scripting and HTML Injection attacks. The 'returnto' parameter is not properly sanitized in several pages, allowing an attacker to inject malicious scripts or redirect users to a different website. The 'Info' field and 'Avatar' field are also vulnerable to HTML Injection attacks. These vulnerabilities can be exploited by sysops, mods, and even end users who need to log in. Internet Explorer 6 and 7 are affected by the HTML Injection vulnerability.

Recent Exploits: