header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LAN Messenger <= v1.2.28 Remote Denial of Service Vulnerability

This exploit targets LAN Messenger version 1.2.28 and below, causing a remote denial of service. It sends a malformed request to the target, resulting in a crash. The exploit has been tested on Windows XP SP3 Professional German and Windows 2008R2 SP1 German.

McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 ActiveX Control GetObject() Security Bypass Remote Code Execution Vulnerability

The McAfee Virtual Technician 6.3.0.1911 ActiveX Control has a vulnerability that allows an attacker to bypass security and execute remote code. This vulnerability is due to the unsafe implementation of the GetObject() function in the control. By specifying the ProgID of an arbitrary class from the underlying operating system, an attacker can load and execute operating system commands. Additionally, it is possible to crash the browser by specifying an arbitrary memory address.

WebCalendar <= 1.2.4 Remote Code Execution Exploit

The WebCalendar <= 1.2.4 is vulnerable to remote code execution. The vulnerability exists in the /install/index.php file (CVE-2012-1495). The code at line 726 attempts to open a file for writing, but does not check if the file handle is empty. This allows an attacker to write arbitrary PHP code to the file, resulting in remote code execution.

Claroline <= 1.7.6 "includePath" remote cmmnds xctn

This exploit allows an attacker to execute arbitrary commands on the target system through a remote code inclusion vulnerability in Claroline <= 1.7.6. The vulnerability is due to the insecure handling of user input in the "includePath" parameter, which can be exploited to include arbitrary PHP code from a remote location. By crafting a specially crafted request, an attacker can execute arbitrary commands on the target system.

Recent Exploits: