header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Soulseek 157 NS Remote Seh Overwrite Exploit

This exploit is a buffer overflow vulnerability in Soulseek 157 NS. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted packet to the Soulseek server. The exploit uses a SEH overwrite technique to gain control of the execution flow.

Kensei Board <= 2.0.0b Multiple Remote SQL Injection Vulnerabilities

Kensei Board version 2.0.0b is vulnerable to multiple remote SQL injection vulnerabilities. The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'f' and 't' parameters to '/index.php' and '/functions/showforum.php' scripts. A remote attacker can execute arbitrary SQL commands in application's database, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, etc. Proof of Concept code is available.

Remote code execution back door(s)

RSGallery2 is a Gallery Extension for Joomla! which contains a low threat security vulnerability that allows remote code execution. The vulnerability is present in the RSGallery2 1.14.3 and 2.0.0b1 releases. An attacker can exploit this vulnerability by downloading the vulnerable version of the software from JoomlaCode and unzipping it. Then, the attacker can use the egrep command to search for the eval() function in the unzipped files.

Safari RSS feed:// buffer overflow via libxml2

This exploit is a Quick-n-dirty PoC for APPLE-SA-2009-05-12 ala CVE-2008-3529. It is a buffer overflow vulnerability in Safari RSS feed:// via libxml2. The exploit uses a meta http-equiv refresh tag to redirect the user to a malicious feed:// URL containing a crafted XML payload. This payload contains a longentity element with a large number of 'A' characters, which causes a buffer overflow when parsed by libxml2.

RoomPHPlanning v1.6 Multiple Remote Exploit Vulnerabilities

The RoomPHPlanning v1.6 application is vulnerable to multiple remote exploits. Authentication Bypass can be achieved by providing username as 'real_user' or '1=1' and password as 'ThE g0bL!N'. Cookies Insecure can be exploited by setting a cookie with the name 'room_phplanning' and value as admin_id. SQL Injection can be exploited by sending a crafted request to the application. Delete Rooms can be exploited by sending a crafted request to the application.

Ultimate Media Script 2.0 Remote Change Password/Add Admin/Delete Admin Exploit

A vulnerability in Ultimate Media Script 2.0 allows remote attackers to change passwords, add admins, and delete admins. This is done by sending a POST request to the 'mod=admins' page with the appropriate parameters. The 'username' and 'pass' parameters are used to add an admin, while the 'username_edit[1]' and 'pass_edit[1]' parameters are used to modify an existing admin.

Hotornot2 Script (Remote apload) Admin Bypass Vulnerability

A vulnerability exists in Hotornot2 Script which allows an attacker to bypass the admin authentication and upload a malicious file. An attacker can exploit this vulnerability by going to http://localhost/[path]/admin/sitebanners/upload_banners.php and uploading a malicious file. The attacker can then view the uploaded file by going to http://localhost/[path]/banners/Shell.php. To bypass the admin backup, the attacker can go to http://localhost/[path]/admin/backup.

Webradev Download Protect v1.0 Remote File Inclusion

Webradev Download Protect v1.0 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the vulnerable server.

Recent Exploits: