header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Atrium Mercur IMAP 5.0 SP3 Messaging Multiple IMAP Commands Remote Exploit

This exploit code allows remote attackers to execute arbitrary code on vulnerable systems running Atrium Mercur IMAP 5.0 SP3 Messaging. The vulnerability is described in detail in the bug reference provided.

Music Animation Machine MIDI Player MAMX SEH BOF

The Music Animation Machine MIDI Player MAMX is prone to a buffer overflow vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. This may facilitate the compromise of the affected computer.

HP Photo Creative v 2.x audio.Record.1 ActiveX Control Remote Stack Based Buffer Overflow

This is a proof of concept exploit for a remote stack based buffer overflow vulnerability in the HP Photo Creative v 2.x audio.Record.1 ActiveX Control. The vulnerability allows an attacker to execute arbitrary code on a targeted system by sending a specially crafted request to the vulnerable ActiveX control. This exploit has been tested against Windows Vista with Internet Explorer 7.

Nodez 4.6.1.1 Mercury (possibly prior versions) multiple vulnerabilities

The 'op', 'bop', 'ext', 'eop' arguments are not properly sanitized before including files from local resources, allowing for arbitrary file inclusion. The 'ext' argument can be used to inject PHP code into the 'cache/ext/statman/log.gtdat' file and execute commands. Additionally, the 'list.gtdat' file in the 'cache/users' folder exposes the MD5 password hashes of all admin and users. This can be exploited by crafting a specific value for the 'upass' parameter.

Ignition 1.3 Remote Code Execution Exploit

The Ignition 1.3 version is vulnerable to remote code execution. Attackers can overwrite the settings.php file by sending a specially crafted POST request and injecting malicious code into one of the variables. This allows attackers to execute arbitrary commands on the target server.

Recent Exploits: