header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FreeVimager 4.1.0 <= WriteAV Arbitrary Code Execution

This exploit allows an attacker to execute arbitrary code in FreeVimager version 4.1.0 or earlier. By crafting a specially designed GIF file and opening it with FreeVimager, the attacker can trigger the vulnerability and execute malicious code on the target system.

Oracle Database Server Local Buffer Overflow Vulnerability

A local attacker may overflow the bounds of an insufficient reserved buffer in oracle process memory, allowing them to trigger the execution of arbitrary instructions in the context of the vulnerable binary.

Microsoft Windows Messenger Service Buffer Overflow Vulnerability

This vulnerability is a buffer overrun vulnerability in Microsoft Windows Messenger Service. It occurs due to insufficient bounds checking of messages before they are passed to an internal buffer. Exploitation of this vulnerability could lead to a denial of service or execution of malicious code in Local System context, potentially allowing for full system compromise.

FreeFloat FTP Server Remote Command Execution USER Command Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in the USER command of FreeFloat FTP Server. By sending a specially crafted payload, an attacker can execute arbitrary commands on the target system. The exploit uses a combination of junk data, a return address, and a payload to achieve code execution.

SQL Injection vulnerability in PHP-Nuke

PHP-Nuke is prone to a SQL injection vulnerability that may allow a remote attacker to inject malicious SQL syntax into database queries. The issue occurs within the admin.php file, specifically when authenticating to a server. The vulnerability is due to insufficient sanitization of user-supplied data. An attacker may exploit this issue to influence SQL query logic and disclose sensitive information about the underlying database to launch further attacks against a vulnerable system.

OpenOffice Remote Denial of Service Vulnerability

OpenOffice is prone to a remote denial of service vulnerability under certain circumstances. The issue presents itself when an attacker connects to a remote OpenOffice session and transmits malicious data to the affected software. The software will apparently fail when handling the malicious data.

Nagios XI Network Monitor Graph Explorer Component Command Injection

This module exploits a vulnerability found in Nagios XI Network Monitor's component 'Graph Explorer'. An authenticated user can execute system commands by injecting it in several parameters, such as in visApi.php's 'host' parameter, which results in remote code execution.

Recent Exploits: