header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Command Execution Vulnerability in OCP-103

The OCP-103 application is vulnerable to command execution due to improper handling of user input. By manipulating the 'req_path' parameter and injecting malicious code through the 'funcs.php' script on an evil host, an attacker can execute arbitrary commands on the target system. The provided example demonstrates how to execute the 'ls' command on the target system.

Eudora 6.2.0.7 on Windows spoof

With spoofed attachments, we could 'steal' files (after a warning?) if the message was forwarded (not replied to). Within text/html part, use &lt;/x-html&gt; to get back to plaintext, no need for NUL or linebreak or nothing: </x-html>. Attachment Converted=00: "c:winntsystem32calc.exe". Attachment Converted=: "c:winntsystem32calc.exe". Attachment Converted: "c:winntsystem32calc.exe"

Buffer Overflow in Monolith Games

This exploit takes advantage of a buffer overflow vulnerability in some old Monolith games. It allows an attacker to overwrite the return address with a specific payload. The payload is a string that starts with 'secure' followed by a long string of 'a' characters and ends with a specific sequence of bytes. The return address is overwritten with the value 0x%08lx. The exploit can be used against vulnerable versions of Alien versus predator 2, Blood 2, No one lives forever, and Shogo.

WordPress HTTP Splitting Vulnerability

The remote host is running WordPress BLOG, a web blog manager written in PHP. The remote version of this software is vulnerable to an HTTP-splitting attack wherein an attacker can insert CR LF characters and then entice an unsuspecting user into accessing the URL. The client will parse and possibly act on the secondary header which was supplied by the attacker. Solution: Upgrade to the latest version of this software Risk factor: Medium

CMS from Scratch <= 1.1.3 (fckeditor) Remote Shell Upload Exploit

The vulnerable code is in /cms/FCKeditor/editor/filemanager/connectors/php/config.php file. The 'Enabled' variable is set to true, allowing unauthorized access to the file. This can be exploited to upload a shell remotely.

Icecast <= 2.0.1 Win32 remote code execution 0.1

This exploit allows remote code execution in Icecast version 2.0.1 and below on Win32 systems. The exploit sends a malformed HTTP GET request to the target server, causing it to execute arbitrary code. The shellcode included in the exploit downloads and executes a shell on port 9999 from http://www.elitehaven.net/ncat.exe.

Recent Exploits: