header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Gateway WebLaunch Buffer Overflow Exploit

This exploit is a buffer overflow vulnerability in the Gateway WebLaunch ActiveX control. It allows an attacker to execute arbitrary code on the vulnerable system. The exploit was tested on Windows XP SP2 (fully patched) English, IE6, Weblaunch.ocx: {93CEA8A4-6059-4E0B-ADDD-73848153DD5E} and Weblaunch2.ocx: {97BB6657-DC7F-4489-9067-51FAB9D8857E}. The exploit was written by e.b. and thanks to h.d.m. and the Metasploit crew.

ImageShack Toolbar 4.5.7 FileUploader Class (ImageShackToolbar.dll) insecure method poc

This vulnerability allows a malicious web page to post arbitrary images on the web from a user hard drive. Images will be visible on ImageShack site, a way for an attacker to retrieve them maybe tag search or by understanding the renaming operation, ex. "_" chars are removed and the "tq2" string is appended. The vulnerability is exploited by using a VBScript to call the BuildSlideShow method of the ImageShackToolbar.dll file, which allows the attacker to upload a file from the user's hard drive.

Move Networks Upgrade Manager Control Buffer Overflow Exploit

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Move Networks Upgrade Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of certain parameters passed to the ActiveX control. By supplying a overly long string, an attacker can cause a stack-based buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user.

Buffer Overflow in Demo() Function

A buffer overflow vulnerability exists in the Demo() function of the given code. The vulnerability is caused due to the lack of proper input validation when handling user-supplied data. An attacker can exploit this vulnerability by supplying a large amount of data to the Demo() function, which can cause a buffer overflow and potentially allow arbitrary code execution.

Liquid-Silver CMS Local File Inclusion Vulnerabilities

Liquid-Silver CMS is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability to read and execute arbitrary files on the server. The attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious input to the vulnerable application. The attacker can use the 'update' parameter to read and execute arbitrary files on the server. The attacker does not need to specify the file extension in the request.

SLAED CMS 2.5 Lite Local file inclusion

SLAED CMS 2.5 Lite is vulnerable to Local File Inclusion due to the lack of input validation. The newlang parameter in the index.php file is not filtered, so an attacker can use the exploit http://[targethost]/[path]/index.php?newlang=../../../../../../../../../../etc/passwd%00 to read the /etc/passwd file.

Comodo AntiVirus 2.0 ExecuteStr() 0day Remote Command Execution Exploit

This exploit allows remote attackers to execute arbitrary commands on vulnerable installations of Comodo AntiVirus 2.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ExecuteStr() method of the vulnerable ActiveX control. By passing a malicious command to the ExecuteStr() method, an attacker can execute arbitrary commands on the vulnerable system.

Web Wiz Forums(TM)

Input passed to the FolderName parameter in "RTE_file_browser.asp" and "file_browser.asp" are not properly sanitised before being used. This can be exploited to list directories, list txt and list zip files through directory traversal attacks. Also, "RTE_file_browser.asp" does not check user's session and an unauthenticated attacker can perform this attack.

Recent Exploits: