header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Fusion [img][/img] exploit

This exploit allows an attacker to inject malicious code into a PHP-Fusion website using the [img] [/img] codes. This code can be used to delete a shout box post, delete a user, or ban a user. The code is written to a file called exploit.txt and can be used to execute the malicious code when an admin views the page.

MySQL Eventum <= v1.5.5 SQL Injection PoC

This exploit is a proof-of-concept for a SQL injection vulnerability in MySQL Eventum version 1.5.5 and earlier. The vulnerability is caused due to the improper sanitization of user-supplied input to the 'cat' parameter in the 'login.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows an attacker to gain access to the application with administrative privileges.

Computer Associates BrightStor ARCserve Backup Agent for SQL and Discovery Service Exploit

This proof-of-concept code exploits a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup Agent for SQL and Discovery Service. It includes a vulnerability scanner that scans for the bugs mentioned above and logs to 'scan.log' in working directory. It also includes a shellcode that can be used to bind or reverse shell.

Quick’n Easy FTP Server 3.0 (pro and lite) Remote D.o.S Exploit by Kozan

This exploit is based on matiteman's code in perl and allows a remote attacker to cause a denial of service (DoS) condition on the vulnerable server. The exploit sends a large buffer of 'A' characters to the server, which causes it to crash.

Windows Genuine Advantage Validation Patch

This exploit is a patch for LegitCheckControl.dll (1.3.254.0) which allows users to bypass the Windows Genuine Advantage Validation. It was released by NeoSecurityTeam in 2005 and was authored by HaCkZaTaN.

Intruder Command Execution DOS Exploit

This exploit is a denial of service attack that uses the libwww-perl library to delete a file on a remote Windows 2000 SP4 system. It connects to the target system, creates malicious pages, opens the CDRom drive of the victim, and then deletes the specified file. The exploit was tested on Windows 2000 SP4 (Win NT).

sHTTP FTPServer Abritary Data Execution Exploit

This exploit allows an attacker to execute arbitrary data on a vulnerable sHTTP FTPServer. The exploit works by connecting to the server, sending user and pass credentials, and then backing up the target file and setting a homepage defacement. The exploit was tested on Windows 2000 SP4 (Win NT).

Recent Exploits: