header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

k`sOSe PDF Exploit

This exploit is a buffer overflow vulnerability in Adobe Acrobat Reader. It is triggered when a maliciously crafted PDF file is opened in Adobe Acrobat Reader. The exploit is based on a heap overflow vulnerability in the JBIG2Decode filter. The vulnerability is caused by a lack of proper validation of the size field in the JBIG2Decode filter. This allows an attacker to overwrite the heap memory with arbitrary data.

[ECHO_ADV_103$2009] taifajobs <= 1.0 (jobid) Remote SQL Injection Vulnerability

Input passed to the 'jobid' parameter in jobdetails.php page is not properly verified before being used in sql queries. This vulnerability can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows attacker retrieving users email, loginname and md5 hash password.

MLdonkey (up to 2.9.7) Remote File Access Vulnerability

MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to access any file with rights of running Mldonkey daemon by supplying a special-crafted request (ok, there's not much special about double slash) to an Mldonkey http GUI (tcp/4080 usually). Thus, the exploit would be as simple as accessing any file on a remote host with your browser and double slash: http://mlhost:4080//etc/passwd

XSS Attack using SMS to Optus/Huawei E960 HSDPA Router

Huawei E960 HSDPA Router (firmware version 246.11.04.11.110sp04) is vulnerable to XSS attack using SMS. One of the feature of this router is the ability to send and receive SMS through its web interface. The SMS text is presented unescaped/unfiltered on the inbox view, and an attacker can craft malicious short messages to gain control over victims router. The first 32 characters of every incoming SMS is presented in unescaped form in the inbox view. The 32 characters limit can be overcome by using several messages, and inserting javascript comment to merge the current message with the next one.

Remote Command Execution Exploit via Apache Log Injection

Pyrophobia 2.1.3.1 is vulnerable to Local File Inclusion vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'pid' parameter of the '/[path]/index.php' script. A remote attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.

pPIM 1.01 (notes.php id) Remote Command Execution Exploit

This exploit allows a remote attacker to execute arbitrary commands on a vulnerable system. It takes advantage of a vulnerability in the notes.php script of pPIM 1.01, which allows an attacker to inject arbitrary commands into the id parameter. The exploit was written in Perl and was tested on localhost.

Microsoft Internet Explorer 7.0.5730.13 “onload” Event Handler Remote Code Execution

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the "onload" event handler. By crafting a malicious page, an attacker can cause a pointer to be reused after it has been freed. This can lead to arbitrary code execution under the context of the user.

Remote SQL Command Injection Exploit

Graugon Forum v1 is vulnerable to a Remote SQL Command Injection Exploit. The vulnerability exists in the view_profile.php page, where an attacker can inject a malicious SQL string into the 'id' parameter. An attacker can exploit this vulnerability by using a '-1 union select' statement to extract data from the database.

Recent Exploits: