header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IDEAL Migration 2009 v4.5.1 Local Buffer Overflow Exploit

This exploit takes advantage of a local buffer overflow vulnerability in IDEAL Migration 2009 v4.5.1. By right clicking the first element in the tree and opening a migration project, an attacker can execute arbitrary code and gain a bind shell on the target system. The exploit code is a shell_bind_tcp payload with a length of 696 bytes. It uses the x86/alpha_mixed encoder and sets the EXITFUNC to seh and LPORT to 4444.

IDEAL Administration 2010 v10.2 Local Buffer Overflow Exploit

This is a local buffer overflow exploit for IDEAL Administration 2010 v10.2. The exploit allows an attacker to execute arbitrary code on the target system by sending a specially crafted payload. The exploit has been found by Dr_IDE and is triggered by opening a migration project and binding a shell. The exploit has been tested on Windows XP SP3.

IA WebMail Remote Exploit

This exploit targets IA WebMail version 3.x using the iaregdll.dll version 1.0.0.5. It uses a specific shellcode for downloading files from a URL and creating a file on the victim's machine. The shellcode is included in the exploit and can be modified to use different URLs and filenames. The exploit has been tested on Windows XP Home SP1 and Windows 2000 Pro SP4. It steals addresses from the iaregdll.dll module import tables, making it work on most servers without alteration. However, it may not work if the server is running a firewall that prevents the urldownloader from spawning a shell. This exploit is for proof-of-concept purposes only.

XSS and Authentication bypass in Advanced Poll Script

The Advanced Poll script has an authentication bypass vulnerability in both the admin login and user login. It can be exploited by using the payload ' or 1=1 or ''=' in both the login and password fields. Additionally, an XSS vulnerability is also found in the search field.

PHP-Fusion v6.00.109 SQL Injection / admin|users credentials disclosure

This exploit allows an attacker to disclose the admin and users credentials in PHP-Fusion v6.00.109. By manipulating the 'msg_send' parameter in the 'messages.php' file, an attacker can execute a UNION SELECT query to retrieve the user_password from the fusion_users table where the user_name matches the admin_username. This vulnerability can be exploited if magic_quotes is turned off.

Memorial Web Site Script –> Reset Password & Insecure Cookie Handling

To reset the password just use this: http://127.0.0.1/[path]/admin/change_pass.php so the password will be null, login with single user can admin: http://127.0.0.1/[path]/admin/ Insecure Cookie Handling exploit: javascript:document.cookie="logged=admin;path=/"; http://127.0.0.1/[path]/admin/

Recent Exploits: