header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Libmimedir VCF Memory Corruption PoC (CVE-2015-3205)

Adding two NULL bytes to the end of a VCF file allows a user to manipulate free() calls which occur during it's lexer's memory clean-up procedure. This could lead to exploitable conditions such as crafting a specific memory chunk to allow for arbitrary code execution.

Milw0rm Clone Script v1.0 – (time based) SQLi

Milw0rm Clone Script v1.0 is vulnerable to a time based SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL code to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.

Pasworld detail.php Blind Sql Injection Vulnerability

Unauthenticated SQL Injection via 'detail.php?id=' parameter. The vulnerable file is '/home/DOMAIN/domains/DOMAIN.go.th/public_html/detail.php'. The POC is 'http://127.0.0.1/detail.php?id=[SQL]'. The SQLMap command is 'python sqlmap.py --url "http://127.0.0.1/detail.php?id=[SQL]" --dbs'. The vulnerable parameter is 'id' with GET request method.

D-Link DSL-526B ADSL2+ AU_2.01 Unauthenticated Remote DNS Change

This vulnerability allows an unauthenticated attacker to remotely change the DNS settings of the D-Link DSL-526B ADSL2+ AU_2.01 router. By sending a specially crafted HTTP GET request to the dnscfg.cgi script, an attacker can change the DNS settings of the router. This can be used to redirect users to malicious websites or to intercept traffic.

D-Link DSL-2730B AU_2.01 Authentication Bypass DNS Change

This security hole allows an attacker to bypass authentication and change the DNS. When the administrator is logged in the web management interface, an attacker may be able to completely bypass authentication phase and connect to the web management interface with administrator's credentials. This attack can also be performed by an external attacker who connects to the router's public IP address, if remote management is enabled. To change the DNS without logging into web management interface use the following URL: http://TARGET/dnscfg.cgi?dnsPrimary=8.8.8.8&dnsSecondary=8.8.4.4&dnsDynamic=0&dnsRefresh=1&dnsIfcsList=WAN-1

Microsoft Internet Explorer 11 Crash PoC

This exploit is a proof of concept for a crash vulnerability in Microsoft Internet Explorer 11. The vulnerability is triggered when the outerHTML of a div element is set to 'AAAA'. This causes an access violation in MSHTML!Tree::ElementNode::GetCElement.

D-Link DSL-2780B DLink_1.01.14 Unauthenticated Remote DNS Change

This vulnerability allows an unauthenticated attacker to remotely change the DNS settings of the D-Link DSL-2780B DLink_1.01.14 router. By sending a specially crafted HTTP request to the router, an attacker can change the DNS settings of the router to any DNS server of their choice.

Broadlight Residential Gateway DI3124 Unauthenticated Remote DNS Change

Broadlight Residential Gateway DI3124 is vulnerable to unauthenticated remote DNS change. An attacker can exploit this vulnerability by sending a malicious GET request to the target server. The malicious request will change the DNS server of the target device to the attacker's DNS server. This will allow the attacker to intercept the traffic of the target device.

Recent Exploits: