header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Virtualmin Multiple Vulnerabilities

Virtualmin is prone to multiple vulnerabilities. Unprivileged port use allows regular users to run their own daemon on port 10000 and prevent Virtualmin to run. XSS and CSRF attacks can be conducted due to lack of input data validation. Anonymous proxy feature can be used to hide the attacker's real location and conduct attacks on different servers. Information disclousure is possible due to system() call in mysql module and lack of dropping root privileges to perform some of its actions.

Icarus 2.0(GUEST.ICP) Local Stack Overflow PoC

This exploit is a proof of concept for a local stack overflow vulnerability in Icarus 2.0(GUEST.ICP). The exploit is written in Perl and creates a file called GUEST.ICP with a header of 'server =' followed by 5000 'A' characters. When the user clicks on the Perl file, the program crashes.

Firefox 3.5 Vulnerability

This vulnerability is related to the Firefox 3.5 browser. It is a heap spray vulnerability which allows an attacker to execute arbitrary code on the target system. The exploit is based on a memory corruption vulnerability in the browser's JavaScript engine. The exploit is triggered by a malicious JavaScript code which is embedded in a web page. The code is executed when the user visits the page. The exploit uses a heap spray technique to inject malicious code into the browser's memory. The malicious code is then executed, allowing the attacker to gain control of the target system.

Mp3-Nator 2.0 (ListData.dat) Universal Buffer Overflow Exploit (SEH)

A buffer overflow vulnerability exists in Mp3-Nator 2.0, which is caused by a boundary error when handling the ListData.dat file. An attacker can exploit this vulnerability to execute arbitrary code by sending a specially crafted ListData.dat file to the victim. This vulnerability is exploited by sending a specially crafted ListData.dat file to the victim, which contains a malicious payload that overwrites the SEH chain and executes arbitrary code.

ScITE Editor 1.72 crash vulnerability Exploit

A buffer overflow vulnerability exists in SciTE Editor 1.72 when a specially crafted file is opened. When the file is opened, the scroll bars are moved which causes a crash. The PoC creates a file with 5000 A characters and when opened with SciTE Editor 1.72, it causes a crash.

RunCMS <= 1.6.3 "double ext" remote shell injection exploit

RunCMS version 1.6.3 and below are vulnerable to a remote code execution vulnerability. An attacker can exploit this vulnerability by uploading a malicious file with a double extension (e.g. .jpg.pwl) to the server via the FCKEditor. The attacker can then execute arbitrary commands on the server by accessing the malicious file with a GET request containing a “cmd” parameter.

Recent Exploits: