header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Win32_exec – EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum

This exploit is a buffer overflow vulnerability in the ASX file header. It is triggered when a maliciously crafted ASX file is opened in Windows Media Player. The exploit overwrites the SEH handler and executes the shellcode, which in this case is a calculator.

Netgear WG102 Access Points Vulnerability

Netgear WG102 Access Points offers the the typical SNMP write & SNMP read community password 'protection'. SNMPv2 is already known for weak security, yet NETGEAR goes one step further: the SNMP write community (password) is accessible in cleartext via the MIB which is readable via the SNMP read community.

Microsoft Internet Explorer “onload” Event Handler Cross-Domain Scripting Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the "onload" event handler. When a page is loaded, the browser will execute any code associated with the "onload" event handler. By using a specially crafted HTML page, an attacker can cause the browser to execute arbitrary code in the context of the currently logged in user.

MP3 TrackMaker v1.5 .mp3 File Heap Overflow PoC

MP3 TrackMaker v1.5 is vulnerable to a heap overflow vulnerability when a specially crafted .mp3 file is opened. The vulnerability is caused due to a boundary error when the application copies user-supplied data to a fixed-length buffer. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted .mp3 file.

Pizzis CMS <= 1.5.1 Blind SQL Injection Exploit

Pizzis CMS version 1.5.1 and prior are vulnerable to Blind SQL Injection. This exploit allows an attacker to extract the admin password from the database. The exploit uses a GET request to send a malicious query to the vulnerable application. The malicious query is crafted to extract the admin password from the database. The exploit then iterates through the characters of the password and prints it out.

Samba < 3.0.20 Heap Overflow

This exploit is for Samba versions < 3.0.20. It is possible to overflow the heap by sending a specially crafted packet to the vulnerable server. The exploit uses the free() function from the GOT (Global Offset Table) to overwrite the return address of the function. This exploit does not work on Mandriva, RHEL, and Fedora.

CuteNews <= 1.4.6 (ip ban) XSS / Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary code on the vulnerable system by exploiting a vulnerability in CuteNews <= 1.4.6. The attacker needs to have a super account (administrator) to exploit this vulnerability. The attacker can inject malicious JavaScript code in the IP ban form and execute arbitrary code on the vulnerable system.

Recent Exploits: