header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ShixxNote 6.net buffer overflow exploit v0.1

This is a buffer overflow exploit for ShixxNote 6.net. The exploit code allows for a shellcode to be bound to port 101. The exploit works only on Windows 2000 systems. It overwrites the EIP with a JMP EBX instruction, which points to a buffer that is adjusted to jump to the shellcode. This exploit does not work on Windows XP and other operating systems due to the availability of the EBX register.

ShadowChode – Cisco IOS IPv4 Packet Processing Denial of Service Exploit

Ping target router/switch for TTL to host. Subtract that number from 255 and use that TTL on the command line. The TTL must equal 0 or 1 when it reaches the target. The target must accept packets to the given target interface address and there are some other caveats.

CCLeague Pro <= 1.2 Insecure Cookie Authentication Vulnerability

CCLeage Pro 1.2 and all prior versions suffer from multiple insecure cookie validation vulnerabilities. The script checks to see if a cookie is set and matches a value, which can be easily bypassed by creating a cookie. The session_id function returns the PHPSESSID, and if no session is created, it returns an empty string. By overwriting the PHPSESSID cookie, the authentication can be bypassed.

LNP: Lightweight news Portal v1.0-BETA Multiple Remote Vulnerabilities

The LNP: Lightweight news Portal v1.0-BETA is vulnerable to multiple remote vulnerabilities including Cross-Site Scripting, Insecure Administration, Permanent Code Injection, and File Upload. These vulnerabilities can be exploited to perform various malicious activities such as executing arbitrary code, injecting malicious scripts, and uploading malicious files.

eLineStudio Site Composer (ESC) <=2.6 Multiple Vulnerabilities

eLineStudio Site Composer is a 100% browser-based database-driven content management system that helps companies to better manage, update & share web content. It has multiple vulnerabilities including injection flaws, cross-site scripting (XSS), SQL injection, information leakage, and failure to restrict URL access. These vulnerabilities can be exploited to perform various attacks such as SQL injection, XSS attacks, database path disclosure, and unauthorized access to server folders.

Recent Exploits: