header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apple MACOS X xnu <= 1228.3.13 local kernel memory leak/DoS POC

This exploit is a proof-of-concept for a local kernel memory leak/DoS vulnerability in Apple MACOS X xnu <= 1228.3.13. It opens the profil system call and fills up to 65536 * 128 bytes of kernel memory. This can lead to a denial of service or a potential information leak.

Siemens Gigaset SE461 WiMAX Router Denial of Service Vulnerability

After establishing a tcp connection to the affected device on port 53 from the LAN interface and after closing the connection the router will restart. Sometimes when using the web trigger with Internet explorer the WAN configuration (ip, gateway ip, dns servers) for the device was lost and a hardware reset was needed in order to make the device usable again. This issue can be triggered from the LAN interface by direct connection or by using specially crafted web content. For the web content to be able to trigger the issue a browser withouth security restrictions on connection to port 53 must be used, the tests done shows Internet Explorer like the only one cappable of activating the bug.

X-BLC <= 0.2.0 SQL Injection Vulnerability

X-BLC is a dynamic web content management system written in PHP. A SQL injection vulnerability exists in X-BLC <= 0.2.0 which allows an attacker to extract data from the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'include/get_read.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to extract data from the database such as usernames and passwords.

[waraxe-2009-SA#073] – Arbitrary File Deletion in Orbit Downloader <= 2.8.7

In both cases IE security settings were default for Internet Zone. Exploitation tests ended successfully without any warnings or other interaction from Internet Explorer. For testing first create "test.txt" file to the C: root dir and then use IE and hit test button. "test.txt" should be deleted for now :)

SuperNews 1.5 SQL Injection in valor.php

SuperNews 1.5 is vulnerable to SQL Injection in the 'valor.php' script. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. An example of the vulnerable URL is http://www.avhsj.com.br/noticias/valor.php?noticia=[SQL-Injection]. A live demo of the exploit can be found at http://www.avhsj.com.br/noticias/valor.php?noticia=-1+union+select+0,1,2,database(),4,5-- and http://www.avhsj.com.br/noticias/valor.php?noticia=-1+union+select+0,1,2,user,pass,5+from+login--.

Bs.Player 2.34 (.bsl) Universal Seh Overwrite Exploit

This exploit is a universal SEH overwrite exploit for Bs.Player 2.34 (.bsl). It was written by Nine:Situations:Group::pyrokinesis and exploited by His0k4. It was tested on Windows XP Pro SP2 Fr. It uses a buffer of 412 A's followed by an EB 12 41 41, a D02658 02 SEH handler, 19 NOPs, and a 343 byte shellcode.

Recent Exploits: