header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NetCat <= 3.12 Multiple Remote Vulnerabilities

NetCat versions 3.12 and lower are vulnerable to multiple remote vulnerabilities. These vulnerabilities include:1. Multiple File Including Vulnerabilities: Due to direct access to certain files, it is possible to redefine internal variables that are passed as arguments in the include() function. Examples of vulnerable files include /netcat/modules/netshop/post.php?system=../../../../.htaccess%00.2. Blind SQL Injection Vulnerabilities: Examples of vulnerable files include /netcat/modules/auth/password_recovery.php?=1'SQL_code.3. Multiple Cross-site Scripting Vulnerabilities: Examples of vulnerable files include /netcat/admin/siteinfo/iframe.inc.php?path=http://ha.ckers.org/scriptlet.html".4. HTTP Response Splitting: Examples of vulnerable files include /netcat/modules/auth/index.php?logoff=1&redirect=http://www.google.com.5. CRLF injection: This vulnerability exists when setting the value %0a in COOKIE variables. It has been found in the file /netcat/add.php.

Proof-of-Concept for Exim Remote Code Execution Vulnerability

This proof-of-concept demonstrates the existence of the vulnerability reported by iDEFENSE (iDEFENSE Security Advisory 01.14.05). It allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested against exim-4.41 under Debian GNU/Linux.

psi jabber client 8010/tcp remote denial of service (win & lin)

This exploit targets the psi jabber client running on port 8010/tcp. It sends a specific payload that causes the client to crash, resulting in a denial of service. The exploit works on both Windows and Linux systems. The exploit was created by sha0[at]badchecksum.net. More details can be found on the author's blog at http://jolmos.blogspot.com.

Joomla Component com_volunteer(job_id) SQL-injection

The Joomla component com_volunteer is vulnerable to SQL injection. An attacker can exploit this vulnerability by manipulating the job_id parameter in the URL to execute arbitrary SQL queries. This can lead to unauthorized access, data leakage, and potential remote code execution.

Internet Exploiter 3 v0.2 ANI stackoverflow PoC exploit

This is a proof of concept exploit for a stack overflow vulnerability in Internet Exploiter 3 v0.2. The exploit takes advantage of a vulnerability in the .ANI file format to overwrite the stack and potentially execute arbitrary code. The exploit works by placing a specially crafted .ANI file in the BODY of an HTML document. The vulnerability was discovered by Yuji Ukai of eEye Digital Security. Microsoft has released a patch for this vulnerability, which can be found at the provided link.

Microsoft SQL Server sp_replwritetovarbin() Heap Overflow

This exploit targets the sp_replwritetovarbin() function in Microsoft SQL Server. It allows for a heap overflow vulnerability. The exploit has been tested on Win2k SP4 with MSSQL 2000. The shellcode used is a modified metasploit reverse shell. This exploit requires a valid SQL account, but can also be used through SQL Injection.

VERITAS Backup Exec Remote Stack Overflow

Remote stack overflow vulnerability in VERITAS Backup Exec v9.1.4691.SP1, v9.1.4691.SP0, and v8.5.3572 allows remote attackers to execute arbitrary code via a crafted packet to the Agent Browser Service.

Recent Exploits: