header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Helpdesk Pilot Knowledge Base SQL injection vulnerability – (article_id)

A SQL injection vulnerability exists in Helpdesk Pilot Knowledge Base version 4.4.0 and lower. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

Soritong MP3 Player 1.0 Universal BOF

This exploit is for Soritong MP3 Player 1.0 Universal BOF vulnerability. It is a buffer overflow vulnerability which allows an attacker to execute arbitrary code by overflowing the buffer with malicious code. The exploit is written in Python and uses a PPR from a .dll application file. It also uses additional NOPs for additional protection.

Powered by eStore v1.0.2

The vulnerability exists in the eStore v1.0.2 web application due to improper sanitization of user-supplied input in the 'cat_id' parameter of the 'store.php' script. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in application's database.

Mini-Stream Ripper v3.0.1.1 Universal BOF

Mini-Stream Ripper 3.0.1.1 is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted .pls file, which when opened by the application, can lead to arbitrary code execution. The exploit uses a universal address from MSRcodec001.dll as the return address and a 4-byte pre-ESP area filler.

RFI Vulnerability in ActiveKB 2005 1.0.0

A remote file inclusion (RFI) vulnerability exists in ActiveKB 2005 1.0.0. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerable parameter is 'panelPHPFile' which is located in the 'class.template.php' file. An attacker can send a specially crafted HTTP request containing a malicious file URL in the 'panelPHPFile' parameter to execute arbitrary code on the vulnerable system.

DirectAdmin v1.34.0 XSRF Create Administrator Vulnerability

This exploit allows an attacker to create an administrator account on a DirectAdmin v1.34.0 server by sending a maliciously crafted HTTP request. The malicious request contains the username, email, and password of the account to be created. The request is sent to the CMD_ACCOUNT_ADMIN page, which is responsible for creating new accounts. This vulnerability can be exploited by an attacker to gain access to the server and perform malicious activities.

Recent Exploits: