header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

QuickTime PictureViewer 7.6.6 JP2000 DoS

This exploit causes a Denial of Service (DoS) and an Access Violation Exception in QuickTime PictureViewer 7.6.6. The exploit file is a JP2000 file with the MD5 hash B2859391D32DBBFCE00FD2F641863954.

joomla com_idoblog /SQL injection Vulnerability

This exploit allows an attacker to inject SQL code into the com_idoblog component of Joomla. By manipulating the 'userid' parameter, the attacker can execute arbitrary SQL queries on the database. The result of the query is then displayed on the website, potentially exposing sensitive information such as usernames, passwords, and email addresses of the Joomla users.

Joomla Component com_xgallery 1.0 Local File Inclusion Vulnerability

The Joomla component com_xgallery version 1.0 is vulnerable to local file inclusion. An attacker can exploit this vulnerability by accessing the img.php file with a specially crafted file parameter, allowing them to include arbitrary local files.

Serv-U FTPD 3.x/4.x/5.x “MDTM” Command remote overflow exploit

This exploit targets Serv-U FTPD versions 3.x, 4.x, and 5.x. It takes advantage of a remote overflow vulnerability in the "MDTM" command. The code is written in C and was developed by Sam and bkbll. It includes shellcode for both connecting back and rebinding a shell. The exploit has been tested on Serv-U versions 4.0, 4.1, and 4.2.

Recent Exploits: