header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mevin Basic PHP Events Lister v2.03

A CSRF vulnerability exists in Mevin Basic PHP Events Lister v2.03, which allows an attacker to add and delete admin users. An attacker can craft a malicious HTML page containing a form with hidden fields that when visited by an authenticated user, will add or delete an admin user.

Sense of Security – Security Advisory – SOS-11-009

GlassFish is an open source application server project led by Sun Microsystems for the Java EE platform. The proprietary version is called Sun GlassFish Enterprise Server. GlassFish supports all Java EE API specifications, such as JDBC, RMI, e-mail, JMS, web services, XML, etc, and defines how to coordinate them. The log viewer fails to securely output encode logged values. As a result, an unauthenticated attacker can trigger the application to log a malicious string by entering the values into the username field. This will cause the application to log the incorrect login attempt and results in a stored XSS vulnerability. By modify the URL parameters, an unauthenticated attacker can trigger the application to output a malicious string. This will cause the application to output the malicious code and results in a reflected XSS vulnerability.

FreeFloat FTP Server REST and PASV Buffer Overflow Exploit

This exploit is for FreeFloat FTP Server version 1.00. It is a buffer overflow exploit that sends a malicious payload to the server via the REST and PASV commands. The payload is designed to execute a shellcode that will open the calculator application. The exploit was tested on Windows XP SP3 Brazilian Portuguese.

GDI+ CreateDashedPath Integer overflow in gdiplus.dll

The vulnerability exists in gdiplus!GpPath::CreateDashedPath function of gdiplus.dll that is responsible for bitmap drawing and other 2d graphic rendering. EMF+ file is one of the image file format that is rendered by the library. And the vulnerability is based on some floating point calculation of an EMF+ path object. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of vulnerable application or cause denial-of-service conditions.

Iconics GENESIS32 Integer overflow version 9.21.201.01

The GenBroker service on port 38080 is affected by three integer overflow vulnerabilities while handling opcode 0x4b0, which is caused by abusing the the memory allocations needed for the number of elements passed by the client. This results unexpected behaviors such as direct registry calls, memory location calls, or arbitrary remote code execution. Please note that in order to ensure reliability, this exploit will try to open calc (hidden), inject itself into the process, and then open up a shell session. Also, DEP bypass is supported.

HP OpenView Network Node Manager Toolbar.exe CGI Cookie Handling Buffer Overflow

This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.0 and 7.53. By sending a CGI request with a specially OvOSLocale cookie to Toolbar.exe, an attacker may be able to execute arbitrary code. Please note that this module only works against a specific build (ie. NNM 7.53_01195)

Recent Exploits: