header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Password Manager v4.1 Insecure Cookie Handling Vulnerability

A vulnerability in Online Password Manager v4.1 allows an attacker to inject arbitrary cookies into the application. An attacker can exploit this vulnerability by sending a maliciously crafted cookie to the application. This can allow the attacker to gain access to the application without authentication.

NetHoteles v2.0 (Auth Bypass) Remote Sql Injection

NetHoteles v2.0 is vulnerable to authentication bypass due to improper input validation. An attacker can exploit this vulnerability by providing malicious input in the username and password fields. This will allow the attacker to bypass authentication and gain access to the application. The attacker can then use the application to perform malicious activities such as data exfiltration, privilege escalation, etc.

Zervit Webserver 0.02 Buffer Overflow

When requested uri isn't found, it goes to char tmp[255], and later it is used to output, you need 256 chars to overflow (check source http.c). An attacker can send a maliciously crafted request with 256 characters to the vulnerable server, which will cause a buffer overflow and allow the attacker to execute arbitrary code on the server.

Windows Media Player (.mid file) Integer Overflow PoC

This exploit is for Windows Media Player. It creates a malicious .mid file which when opened in Windows Media Player, causes an integer overflow resulting in a crash. The malicious .mid file contains a header with a length of 0x6, followed by a track header with a length of 0x4e. The track header contains a malformed MIDI message which causes the integer overflow.

Job2C version 4.2 (adtype) MulTiple LFi

Job2C version 4.2 is vulnerable to multiple Local File Inclusion (LFI) vulnerabilities. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'adtype' parameter in 'windetail.php' and 'detail.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious 'adtype' parameter value to the vulnerable script. This can allow the attacker to include and execute arbitrary local files on the vulnerable system.

Recent Exploits: