header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DESlock+ <= 3.2.6 local kernel ring0 link list zero SYSTEM exploit

This exploit is a local kernel ring0 link list zero SYSTEM exploit for DESlock+ version 3.2.6 and below. It is tested on DLMFENC.sys 1.0.0.26 and DLMFDISK.sys 1.2.0.27 on Microsoft Windows 2003 SP2 and Microsoft Windows XP SP2. It is compiled using MinGW and -lntdll.

DESlock+ <= 3.2.6 local kernel mem leak PoC

DESlock+ is a disk encryption software developed by DESlock Ltd. A local kernel memory leak vulnerability exists in DESlock+ versions prior to 3.2.6. An attacker can exploit this vulnerability by continually allocating link list structures and never freeing them. This can lead to a denial of service condition.

lightblog 9.6 local file inclusion vulnerability

A local file inclusion vulnerability exists in Lightblog 9.6. An attacker can exploit this vulnerability to include a file from the local system by sending a specially crafted HTTP request to the vulnerable application. This can be used to read sensitive files from the local system.

Mambo component Portfolio Manager 1.0 (com_portfolio)

The vulnerability is caused due to the improper sanitization of user-supplied input to the 'memberId' parameter in 'index.php' script when passing it to the 'mos_users' SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows an attacker to gain access to the database and disclose sensitive information.

Joomla Component astatsPRO Remote SQL Injection Vulnerability

A vulnerability exists in Joomla Component astatsPRO, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in the 'refer.php' script. This can be exploited to disclose the admin username and password hash, as well as other sensitive information from the database.

XPWeb 3.3.2 (Download.php url) Remote File Disclosure Vulnerability

XPWeb 3.3.2 is vulnerable to remote file disclosure. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can be done by appending the file path to the vulnerable URL. For example, an attacker can send a request to the vulnerable URL “/XPWeb_v3.3.2/Download.php?url=Config.inc.php” to view the contents of the “Config.inc.php” file. Similarly, an attacker can send a request to the vulnerable URL “/XPWeb_v3.3.2/Download.php?url=../../../../../../../etc/passwd” to view the contents of the “/etc/passwd” file.

Recent Exploits: