header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ultraiso local buffer overflow POC(0day)

This is a local buffer overflow exploit in UltraISO. The exploit takes advantage of a buffer overflow vulnerability in the software to execute arbitrary code. The overflow occurs when parsing a CCD file with a specific structure. By crafting a CCD file with a payload, an attacker can overwrite the return address and gain control of the program flow. This exploit is a proof-of-concept (0day) and can be used to demonstrate the vulnerability.

Joomla 1.5.12 Remote Code Execution via TinyMCE upload vulnerability

This exploit allows an attacker to upload a PHP shell through the TinyMCE plugin in Joomla 1.5.12, leading to remote code execution. The attacker can then execute arbitrary commands on the target system.

DJ Studio Pro 5.1.6.5.2 SEH Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable system running DJ Studio Pro version 5.1.6.5.2. By exploiting a buffer overflow vulnerability, the attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow. This exploit specifically executes the calc.exe program, but it could be modified to execute any other malicious code.

Firelinking 2 – Proof-of-Concept by mikx

This Proof-of-Concept (PoC) demonstrates a cross-platform vulnerability that allows the creation and execution of files. On Windows, it creates the file c:booom.bat and launches it, which opens a command prompt with a dir command. On Linux and MacOSX, it creates the file ~/booom.txt or /booom.txt. In some cases, the script might run twice, resulting in an additional booom-1.txt file.

Human Resource Management System – SQL Injection (unauthenticated)

SQL Injection vulnerability exists in the Human Resource Management System (HRM) application. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request to the login page of the application. The attacker can then use the sqlmap tool to exploit the vulnerability and gain access to the database.

WP All Import v3.6.7 – Remote Code Execution (RCE) (Authenticated)

The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.

Senayan Library Management System v9.5.0 – SQL Injection

The `keywords` parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the keywords parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. The injection is confirmed manually from nu11secur1ty. The attacker can retrieve all information from the database of this system, by using this vulnerability.

Recent Exploits: