header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla com_ijoomla_archive Blind SQL Injection Exploit

This exploit is used to gain access to the Joomla com_ijoomla_archive component. It uses a blind SQL injection vulnerability to gain access to the password of the user with the given ID. The exploit works by sending a request to the server with the given user ID and a boolean expression. If the expression is true, the length of the response will be different than if the expression is false. By comparing the length of the response, the exploit can determine the value of the boolean expression and thus gain access to the password.

libc:fts_*():multiple vendors, Denial-of-service

A denial-of-service vulnerability exists in the fts_*() functions of multiple vendors, which could allow an attacker to cause a denial-of-service condition. The vulnerability is due to an error in the fts_open() function, which can be used to traverse a file hierarchy. By supplying a specially crafted path to the fts_open() function, an attacker can cause a denial-of-service condition.

SupportSoft DNA Editor Module (dnaedit.dll v6.9.2205) remote code execution exploit (IE6/7)

This exploit allows remote code execution by using the PackageFiles() method of the SupportSoft DNA Editor Module (dnaedit.dll v6.9.2205). The exploit injects a file path into msinfo.htm, which can be used to execute arbitrary code.

Media Commands .m3l Local Buffer Overflow Exploit

This exploit is for a local buffer overflow vulnerability in Media Commands .m3l. The vulnerability is caused due to a boundary error when handling user supplied data. This can be exploited to cause a stack-based buffer overflow by sending an overly long string to the affected application. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the application.

Easy Web Password V1.2 Local Heap Memory Consumption Proof of Concept

A vulnerability in Easy Web Password V1.2 allows an attacker to cause a denial of service (DoS) condition by overwriting the EDX register with 0x41414141. This can be exploited by an attacker to cause a denial of service condition by sending a specially crafted .ewp file to the victim.

Easy File Sharing Web Server File Disclouse Vulnerability

A vulnerability exists in Easy File Sharing Web Server 4.8 which allows an attacker to view the contents of any file on the server. This is done by sending a specially crafted HTTP request to the server. The request contains a parameter 'vfolder' which is used to specify the file to be viewed. By using a relative path, an attacker can view any file on the server.

MS09-002 Exploit

This exploit is based on the code found by str0ke in the wild for MS09-002. It is tested using Internet Explorer 7.0.5730.11 on Windows XP SP2. The exploit uses a win32_exec payload to execute a calc.exe command. It uses a heap spray technique to spray the heap with the payload and execute it.

Recent Exploits: