header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component MisterEstate Blind SQL Injection Exploit

This exploit is related to a Blind SQL Injection vulnerability in the Joomla Component MisterEstate. The exploit is used to extract the username and password of an administrator account by exploiting the vulnerability in the 'index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component' page. The exploit uses a loop to iterate through the characters of the username and password and then concatenates them to form the complete username and password.

Infinity <= v2.X.X Local File Disclosure / Auth Bypass Vulnerabilities

Infinity version 2.X.X is vulnerable to Local File Disclosure and Authentication Bypass. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious parameters to the vulnerable application. This will allow the attacker to access sensitive information from the server and bypass authentication.

Autonomous LAN party <= 0.98.3 Remote File Include Vulnerability

A Remote File Include vulnerability exists in Autonomous LAN party version 0.98.3 and earlier. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerable parameter is 'master[currentskin]' in the '_bot.php' file.

broid 1.0 Beta 3a (.mp3 File) Local Stack Overflow PoC

A stack-based buffer overflow vulnerability exists in broid 1.0 Beta 3a when handling .mp3 files. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is due to a lack of proper bounds checking when handling .mp3 files. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted .mp3 file.

ZTE CORPORATION ADSL Modem ZXDSL 831 II Exploit

This modem is used by many providers in the world like russia india and algeria [used by provider and all clients of 'Easy ADSL']. We can change easily the user and password admin and get full access to the modem. Go only here and set new user and password: http://192.168.1.1/adminpasswd.cgi

Set Attribute Crash

This vulnerability is caused by a buffer overflow in the setAttribute() method of Internet Explorer. When a long string is passed to the setAttribute() method, it causes a buffer overflow and can be used to execute arbitrary code. This vulnerability affects Internet Explorer versions 6 and 7 on Windows XP and Vista.

Safari 4.0.2 Stack Overflow

A stack overflow vulnerability was found in WebKit's JavaScript code that parses floating point numbers. It can be triggered with script like this: <script> var Overflow = "31337" + 0.313373133731337313373133731337...; </script> Or something like this: <img width=0.3133731337313373133731337... src="31337.jpg"> Play little bit with numbers to get a desirable return address, little bit of heap spraying, and it works.

Recent Exploits: