header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

dne2000-call.c

This exploit is for Deterministic Network Enhancer (dne2000.sys) which is bundled with SafeNET HighAssurance Remote, SoftRemote, Cisco VPN Client and Winproxy. It is tested on dne2000.sys 2.21.7.233 to 3.21.7.17464. It is compiled using MinGW and -lntdll. It is a local kernel ring0 SYSTEM exploit which uses win32_fixup, win2k3_ring0_shell and winxp_ring0_shell to exploit the vulnerability.

Joomla ~ option: com_simpleshop ~ SQL Injection

This exploit allows an attacker to inject malicious SQL queries into the vulnerable application. The vulnerable parameter is the 'catid' parameter which is not properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

MyMarket 1.72 Blind SQL Injection Exploit

MyMarket 1.72 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The exploit requires a valid category ID and the password is stored in MD5, making it difficult to exploit. The exploit is done by sending unexpected values to the 'id' parameter and then using Union Selecting to extract the data.

Oxygen 2.0 SQL Injection Vulnerability

This Board Software suffers from a not correctly verified quote ID variable which is used in SQL Querys. An Attacker can easily get sensitive information from the database by injecting unexpected SQL Querys. We need a valid topic ID. Im not bored enough to code an exploit for this, so do it manually. Its by the way easy to find the correct prefix for the tables by producing a SQL Error. When injected your Query you can find the output in the Subject Text Box.

Alt-N SecurityGateway v1.00-1.01 Remote Stack Overflow Exploit

Obtain the overflow and crash the application is peace a cake job. To make a wroking code execution here is a hell. First we can see that the username before overflow the buffer pass through some functions, that changes and restrict some useful chars. Firstly the beffer gets lowered so the overflow should not contain upper chars :( . So i decided to use some encoders for the payload like nonupper and non alpha from MSF. The nonupper use the `@` (0x40) char which the app doesn't eat at all. The nonalpha encoder in decoder code and the generated body contained always the 0xC0, 0xC1, 0x80, 0x81 which were translated to 0xE0, 0xE1, 0x90, 0x91. Don't know, may be this chars translation was due to my russian locale. After few days of work i have comed with the required bindshell which bypass all restricted chars and executes. Thx to skylined, for his alpha tool.

Anata CMS 1.0b5 Arbitrary Add-Admin Exploit

Anata CMS 1.0b5 have Vulnerability to escalate user to administartor's privilege. That Vulnerable in 'Change Profile Sections' (http://[Target]/[ananta_path]/change.php) and you can injection code into form,This action will give your account can use Admin Control Panel (http://[Target]/[ananta_path]/admin/index.php?Menus) with Administrative's Privilege.

Recent Exploits: