header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

News 1.0 XSRF Vulnerability (Add Admin)

This exploit allows an attacker to add an admin user to the News 1.0 system without proper authorization. The exploit consists of a form that sends a POST request to http://localhost/News/admin/index.php with the necessary parameters to add a new user with admin privileges. The parameters include the username, password, email, and group ID. The attacker can modify these parameters to add any desired user.

Zend Java Bridge v3.1 – Remote Code Execution (ZDI-11-113)

The Zend Java Bridge component in Zend Server v5.0.2, Zend Server Community Edition v5.0.2, and previous releases allows remote attackers to execute arbitrary Java code via a crafted serialized Java object, related to the Java Class Library (JCL) and Java Reflection.

AVI DoS in Media Player Classic – Home Cinema

The DoS is caused by an access violation exception in the module mpc-hc.exe. The exploit code is provided in a file named 'Media Player Classic - Home Cinema 1.5.0.2827 - AVI DoS.avi'. Opening this file in the vulnerable version of Media Player Classic - Home Cinema (1.5.0.2827) will cause the DoS.

Windows Explorer DoS

The DoS is caused by an unhandled exception in the module Shmedia.dll, which is loaded via Explorer.exe. The exploit code contains assembly instructions that manipulate registers and perform an integer division by zero, resulting in a crash.

GOM Player AVI DoS Exploit

This exploit causes a denial of service (DoS) by exploiting a vulnerability in GOM Player version 2.1.28.5039. By opening a specially crafted AVI file, an attacker can trigger an access violation exception, causing the application to crash and become unresponsive.

IDEAL Administration 2011 v11.4 Local SEH Buffer Overflow Exploit

This exploit takes advantage of a local SEH buffer overflow vulnerability in IDEAL Administration 2011 v11.4. It allows an attacker to execute arbitrary code on the target system by overflowing the SEH buffer. The exploit uses a bind shell payload encoded with x86/alpha_mixed encoder. The payload sets the LPORT to 4444 and uses the seh exit function.

Recent Exploits: