header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DB2TEST Database Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a target system running the DB2TEST database. The exploit requires the presence of a GUEST account with the password QQ on the target system. It sends a specially crafted payload to the target system's port 50000 to execute the code.

UltraISO <= 9.3.3.2685 CCD/IMG Universal Buffer Overflow Exploit

This exploit targets UltraISO version 9.3.3.2685 and allows for a universal buffer overflow. It was discovered and exploited by SkD (skdrat@hotmail.com). The exploit involves opening either a CCD or IMG file in UltraISO. Note that opening the CCD file will also cause an access violation in MagicISO. Private exploits are available for sale by contacting the author at skdrat@hotmail.com. The author holds no responsibility for any damage caused by this exploit.

k`sOSe – 02/16/2009 – CVE-2008-5457

This exploit is a Perl script that demonstrates remote code execution vulnerability. It uses the cohelet framework-3.2 and the meterpreter payload to establish a reverse TCP connection. The exploit was tested on Windows 2000 SP4 and Windows 2003 R2 SP2 without NX support. The exploit opens a meterpreter session on the target machine and allows the attacker to execute commands on the compromised system.

vBulletin Version 3.0.1 RCE vulnerability

This exploit allows an attacker to execute arbitrary code on a vBulletin 3.0.1 website by injecting malicious code into the 'template' parameter of the 'misc.php?do=page' URL. The attacker can execute system commands or PHP functions using this vulnerability.

BandSite CMS 1.1.4 (SQL/Upload Shell) Multiple Remote Vulnerabilities

The BandSite CMS 1.1.4 is vulnerable to SQL Injection attacks in the member_content.php file. An attacker can manipulate the 'memid' parameter to execute arbitrary SQL queries. Additionally, the CMS allows an authenticated administrator to upload malicious files, which can be used to gain unauthorized access to the system.

Recent Exploits: