header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BackendCMS Version 5.0 SQl Injection

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. This can allow the attacker to gain access to the application database and potentially gain access to sensitive information.

SWF Opener .swf Off By One / Underground Bof Poc

SWF Opener is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in a denial-of-service condition.

shell upload/local file

Photo-GraffixV3.4.zip is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability by uploading a malicious shell file to the vulnerable web application and then accessing the file via the vulnerable wmprocess.php script. This will allow the attacker to execute arbitrary code on the server.

GOM Player Subtitle Buffer Overflow Vulnerabiltity

A buffer overflow vulnerability exists in GOM Player 2.1.16.6134. A specially crafted .srt file with a length of 10240 x 4 bytes can cause a denial of service condition when opened with GOM Player. This vulnerability affects Windows XP, Windows Vista, and Windows 7.

gw-notexit.sh: Linux kernel <2.6.29 exit_notify() local root exploit

This exploit is based on the 'exit_notify()' CAP_KILL verification bug found by Oleg Nestorov. It allows an attacker to send arbitrary signals to a privileged (suidroot) parent process. Due to a bad check, the child process with appropriate exit signal already set can first execute a suidroot binary then exit() and thus bypass in-kernel privilege checks. The attacker uses chfn and gpasswd for that purpose.

Recent Exploits: