header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

My Simple Forum v7.1 Remote Command Execution Exploit

This exploit allows an attacker to execute commands remotely on a server running My Simple Forum v7.1. The vulnerability is caused by a local file inclusion vulnerability at /theme/default/index.template.php?action=[lf]%00. Additionally, there is an XSS vulnerability at /theme/default/index.template.php?Name=[XSS] which requires Register Globals to be turned on. The exploit was discovered by Giovanni Buzzin and Osirys.

Thomson TCW690 POST Password Validation exploit

This exploit allows an attacker to change the password of a Thomson TCW690 router by sending a malicious POST request. The vulnerability was discovered by MurDoK in 2005. The exploit code is written in C and can be compiled and executed on a Linux system. The exploit sends a POST request to the router's /goform/RgSecurity URL with the new password as a parameter. The exploit requires the IP address of the router and the new password as command line arguments. After successful execution, the user is instructed to visit http://192.168.0.1 to confirm the password change.

Knox Arkiea Server Backup arkiead local/remote root exploit

This exploit targets Knox Arkiea Server Backup versions up to 5.3.x. It allows an attacker to gain root or SYSTEM privileges on Linux and Windows systems. On Linux, it exports an xterm to a chosen box by exploiting a stack overflow in a type 77 request. On Windows, it spawns a shell on port 80 of the remote host by overwriting EIP. The exploit includes targets for Redhat 7.2/8.0, Windows 2000 SP2/SP3/SP4, Windows XP SP1, and Windows 2003 EE.

POP Peeper 3.4.0.0 .html file Universal SEH Overwrite Exploit

This exploit allows an attacker to perform a universal SEH overwrite in POP Peeper 3.4.0.0. By opening a specially crafted .html file, the attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow.

POP Peeper 3.4.0.0 .eml file Universal SEH Overwrite Exploit

This exploit is for POP Peeper version 3.4.0.0 and targets a universal SEH (Structured Exception Handling) overwrite vulnerability. The exploit is triggered by opening a message or using the Ctrl + O command and selecting a specially crafted .eml file. Upon successful exploitation, the exploit executes a payload that launches the Windows Calculator application. This exploit was developed by Stack and credited to Mountassif Moad. Special thanks are given to Simo, SOft, Jadi, and Str0ke.

Pluck v 4.6.1 LFI exploit

This exploit targets the Pluck v 4.6.1 CMS and takes advantage of a local file inclusion vulnerability in the 'module_pages_site.php' file. By manipulating the 'post' parameter in the URL, an attacker can include arbitrary files on the server. The exploit provides a proof of concept by including the 'ls' command to list the contents of the '/bin' directory.

Recent Exploits: