header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nokia Bluetab Exploit

This exploit creates a file called bluetab.txt with the user's Bluetooth nickname. When the file is sent to a Nokia mobile device and the nickname is copied and pasted into the device's Bluetooth nickname, any mobile device that searches for and finds the nickname will restart. This exploit also works on many other Symbian and Java mobile devices.

Apache Squirt Exploit

This exploit targets Apache web servers on Windows systems. It sends a specially crafted header to the server, causing a denial of service condition. The trys parameter determines the number of times the exploit is executed. Increasing the trys parameter can increase the impact of the DoS attack. The exploit has been tested on Apache 2.0.49 running on Windows 2000 SP4.

Destiny Media Player 1.61 (.rdl) Local Buffer Overflow Exploit

This exploit targets Destiny Media Player version 1.61 by creating a malicious .rdl file that triggers a buffer overflow. When the file is double-clicked, it executes arbitrary code, in this case, a command to open the calculator on Windows systems.

Dokeos LMS <= 1.8.5 Remote PHP Code Injection Exploit

This exploit takes advantage of a vulnerability in the Dokeos LMS version <= 1.8.5, specifically in the 'whoisonline.php' file. The vulnerable code is located in the 'tablesort.lib.php' file, where user input is not properly sanitized before being used in a comparison function. This allows an attacker to inject arbitrary PHP code and execute it remotely. The exploit uses the 'sort_table' function to execute the injected code.

Recent Exploits: