header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe Flash Player Regular Expression Heap Overflow

This module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 11.5.502.149. By supplying a specially crafted swf file with special regex value, it is possible to trigger an memory corruption, which results in remote code execution under the context of the user, as exploited in the wild in February 2013. This module has been tested successfully with Adobe Flash Player 11.5 before 11.5.502.149 on Windows XP SP3 and Windows 7 SP1 before MS13-063, since it takes advantage of a predictable SharedUserData in order to leak ntdll and bypass ASLR.

PTCeffect LFI & SQL Injection Vulnerabilities

The LFI vulnerability is in index.php, so you can include a file by doing http://[site]/index.php?view=[file]. By using the LFI, you can also include 'admin files' which are especially unsecure, and let you inject SQL queries. As the file admin/sources/edit_loginad.php, a PoC can be done by http://[site]/index.php?view=../admin/Sources/edit_loginad&edit=-1%20union%20select%201,2,3,4,%28SELECT%20password%20FROM%20admin%29,6,7,8,9--%20-

CMSimple – Open Source CMS with no database <= Remote File Inclusion Vulnerability

CMSimple is a php based Content Managemant System (CMS), which requires no database. All data are stored in a simple file system. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which includes a URL in the 'pth[folder][plugin]' parameter. This can allow the attacker to include a remote file containing arbitrary code, which will be executed by the vulnerable server.

DoS poc for CVE-2014-2851

This exploit is a proof-of-concept (PoC) code for CVE-2014-2851, which is a Linux group_info refcounter overflow memory corruption vulnerability. The code is written in C and is designed to crash the system if the app does not crash. It takes a while to execute because it calls 2^32 socket() calls.

NRPE – Nagios Remote Plugin Executor <= 2.15 Remote Command Execution

Nagios Remote Plugin Executor (NRPE) contains a vulnerability that could allow an attacker to remotely inject and execute arbitrary code on the host under NRPE account (typically 'nagios'). The vulnerability is due to NRPE not properly sanitizing user input before passing it to a command shell as a part of a configured command. In order for an attacker to take advantage of the host NRPE must be compiled and configured with command arguments. No authentication is required to exploit this vulnerability if the NRPE port has not been protected with a firewall.

seh unicode buffer overflow (DOS)

This exploit is a SEH Unicode buffer overflow vulnerability in jZip v2.0.0.132900. The vulnerability is triggered when a specially crafted zip file is opened, causing a denial of service. The exploit author created a zip file with a payload of 862 A characters, followed by two 4-byte NSEH and SEH values, and then 3198 D characters. The payload is then followed by a .txt extension.

Recent Exploits: