header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Geeklog <= 1.5.2 savepreferences()/*blocks[] remote sql injection exploit

This exploit takes advantage of a remote SQL injection vulnerability in the savepreferences() function of Geeklog version 1.5.2 and earlier. The vulnerability allows an attacker to manipulate the $_POST[] variables passed to the function, potentially leading to unauthorized access or data manipulation. The vulnerability is located in the usersettings.php file, specifically near lines 1467-1480. The savepreferences() function does not properly sanitize user input, allowing for SQL injection attacks. This exploit sets various $_POST[] variables to specific values, bypassing any input validation or sanitization and potentially executing arbitrary SQL queries.

Star Downloader Free (.dat) Universal SEH Overwrite Exploit

This exploit targets Star Downloader Free version <= v1.45. It exploits a Universal SEH (Structured Exception Handling) Overwrite vulnerability in the handling of .dat files. By creating a specially crafted file, an attacker can overwrite the SEH chain and execute arbitrary code.

Steamcast Remote Buffer Overflow Exploit

This exploit takes advantage of a buffer overflow vulnerability in Steamcast's HTTP request handling. It is a SEH-based exploit that allows remote code execution. The exploit runs a shellcode that will be executed when the program is closed. It requires finding a DLL that is not compiled with GS (Stack Cookies) protection. The provided shellcode is the 'win32_adduser' payload from Metasploit, which creates a new user on the target system.

wu-ftpd <= 2.6.2 File Globbing DoS

This exploit allows an attacker to cause a denial of service by sending a specially crafted request to the vulnerable FTP server. The vulnerability exists in the file globbing functionality of the wu-ftpd server. By sending a specific request, an attacker can cause the server to enter an infinite loop, consuming all available resources and making the server unresponsive.

Quake 3 engine Huffman algorithm

This code is a modified version of the Huffman algorithm used in the Quake 3 engine. It is used for compressing and decompressing data. The code is taken from the Q3fusion project by Andrey Nazarov. The modified version includes changes to variables and function prototypes to improve performance and simplify usage.

Avaya IP Office Phone Manager – Cleartext Sensitive Data Vulnerability Exploit v0.01

This exploit allows an attacker to retrieve sensitive data, such as usernames, IP addresses, and passwords, from Avaya IP Office Phone Manager. It works by querying the Windows registry for specific values and printing them to the console.

Recent Exploits: