header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote File Inclusion in SocialMPN

This script tests for a remote file inclusion vulnerability in SocialMPN. It takes two command line arguments: the target website and the exploit file. It sends a request to the target website with the specified exploit file included in the URL. If the response contains 'HTTP/1.0 200 OK', it indicates that the site may be vulnerable.

eggdrop/windrop remote crash vulnerability

The SA25276 patch uses strncpy to fix a buffer overflow vulnerability in src/mod/server.mod/servmsg.c (gotmsg). The last argument is not checked for being non-negative, but that can happen if ctcpbuf is ''. That causes a remote crash vulnerability to be exploited by anyone connected to the same IRC network as eggdrop.

OpenBSD Remote DoS Exploit

This exploit targets OpenBSD versions 2.0 to 3.6 and causes a remote Denial of Service (DoS) by sending a specially crafted packet. It takes advantage of a vulnerability in the OpenBSD errata. The exploit was coded by __blf in 2005 for the RusH Security Team. The public version of this exploit allows for the modification of the TimeStamp to cause a system crash. The exploit has been tested on OpenBSD 3.5 and 3.6. The vulnerability details can be found in the OpenBSD errata page (http://www.openbsd.org/errata.html).

2daybiz Business Community Script (adminaddeditdetails.php) Add Admin / Remote Blind SQL Injection Exploit

The adminaddeditdetails.php script in the 2daybiz Business Community Script is vulnerable to a remote blind SQL injection attack. An attacker can exploit this vulnerability to gain unauthorized access to the application's database.

Blind SQL Injection Exploit

This exploit is for a blind SQL injection vulnerability in the Family Connections CMS version 1.9 and below. The vulnerability allows an attacker to inject SQL queries through the 'member' GET variable. The exploit takes advantage of the vulnerability to extract sensitive information from the database.

Recent Exploits: