header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Exploits Cisco Security Agent Management Console ‘st_upload’ (CVE-2011-0364)

This exploit is used to gain access to the Cisco Security Agent Management Console by creating a directory tree and dropping malicious files. The malicious files include an .htaccess file to enable scripting and a backdoor file to gain command access.

VeryTools Video Spirit Pro <= 1.70

This module exploits a stack buffer overflow in Video Spirit <= 1.70. When opening a malicious project file (.visprj), a stack buffer overflow occurs, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7.

IBM Lotus Domino iCalendar MAILTO Buffer Overflow

This module exploits a vulnerability found in IBM Lotus Domino iCalendar. By sending a long string of data as the 'ORGANIZER;mailto' header, process 'nRouter.exe' crashes due to a Cstrcpy() routine in nnotes.dll, which allows remote attackers to gain arbitrary code execution.

AOL Desktop 9.6 RTX Buffer Overflow

This module exploits a vulnerability found in AOL Desktop 9.6's Toolich.rct component. By supplying a long string of data in the hyperlink tag, rich.rct copies this data into a buffer using a strcpy function, which causes an overflow, and results arbitritray code execution.

REMOTE SQL iNJECTioN

A remote SQL injection vulnerability exists in K-Links software. An attacker can send a maliciously crafted request to the vulnerable server, which can be used to execute arbitrary SQL commands. The proof of concept is a maliciously crafted URL that contains an SQL injection payload. The payload is sent to the vulnerable server, which then executes the malicious SQL command.

MikeyZip 1.1 .ZIP File Buffer Overflow

MikeyZip 1.1 is vulnerable to a buffer overflow vulnerability when handling specially crafted .ZIP files. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability exists due to a boundary error when handling .ZIP files. A specially crafted .ZIP file can cause a buffer overflow, which can be exploited to execute arbitrary code. The vulnerability is triggered when the application opens a specially crafted .ZIP file.

Point Market System 3.1x vbulletin plugin SQL Injection Vulnerability

The security problem in the file 'market.Php' has been created. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the 'market.php' file. An example of a malicious query is '-1+union+select+1,2,3,4,5,6,@@version,8,9,10,11,12,13--'

Libmodplug ReadS3M Stack Overflow

Libmodplug library is prone to a stack based buffer overflow vulnerability due to insufficient validation of user supplied data. An attacker is able to execute arbitrary code in the context of the user when opening malicious S3M media files. Vulnerability exists in ReadS3M method, vulnerable code is located in load_s3m.cpp (excerpt): WORD ptr[256];...memset(ptr, 0, sizeof(ptr));if (nins+npat){memcpy(ptr, lpStream+dwMemPos, 2*(nins+npat)); variables nins and npat are controlled by user and are read from supplied file without any validation. These parameters directly influence the amount of data to be copied, this can be uesed to overflow the stack.

Recent Exploits: