header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Belkin Bulldog Plus HTTP Server Remote Buffer Overflow Exploit

This exploit is a buffer overflow vulnerability in the Belkin Bulldog Plus HTTP Server. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted HTTP request. The vulnerability is caused due to a boundary error when handling the 'username' parameter in the '/login.rsp' script. This can be exploited to cause a stack-based buffer overflow by sending an overly long string in the 'username' parameter.

Flatchat 3.0 (pmscript.php with) Local File Inclusion Vulnerability

A vulnerability in Flatchat 3.0 allows an attacker to include a file from a remote server via a URL in the 'with' parameter in pmscript.php. This can be exploited to execute arbitrary PHP code by including files from external resources that contain malicious code.

Thickbox Gallery v2 Local File Inclusion Vulnerability

A proof-of-concept (PoC) exploit for a local file inclusion vulnerability in Thickbox Gallery v2 was published. The vulnerability is triggered when a maliciously crafted URL is sent to the vulnerable server. This URL contains a maliciously crafted parameter that can be used to include a file from the local file system. The malicious URL can be used to include a file from the local file system, such as BOOTSECT.BAK.

Recent Exploits: