header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IPB (Invision Power Board) all versions (1.x? / 2.x / 3.x) Admin account Takeover leading to code execution

Incorrect e-mail address validation code allows an attacker to take over the admin account without prompting any alert but preventing the real admin to login afterwards. After a successful takeover, the attacker can plant a PHP backdoor using IPB's templating system.

Adrenalin Player 2.2.5.3 Buffer Overflow Exploit(SEH)

Adrenalin Player 2.2.5.3 is vulnerable to a buffer overflow exploit. The vulnerability is triggered when a specially crafted .m3u file is opened. The exploit code contains a NOP sled followed by a shellcode that spawns a calculator. The exploit code is written in assembly language and is designed to overwrite the SEH (Structured Exception Handler) record.

Mini Web HTTP Server remote DoS exploit

This exploit is a proof-of-concept (PoC) for a remote denial-of-service (DoS) vulnerability in MiniWeb HTTP server (build 300, built on Feb 28 2013) by Stanley Huang. The vulnerability is caused by a heap corruption when sending a specially crafted POST request with a large number of 'A' characters. This can cause the server to crash.

File Lite 3.3 & 3.5 PRO iOS – Multiple Web Vulnerabilities

A local file include and arbitrary file upload vulnerability is detected in the mobile File Lite 3.3 & 3.5 PRO iOS app (Apple - iPad|iPhone). The vulnerability allows remote attackers via POST method to include unauthorized remote files on the affected webserver file system. Remote attackers can also unauthorized implement mobile webshells by using multiple file extensions (*.php.js.gif) when proccessing the upload request. A persistent input validation web vulnerability is detected in the mobile File Lite 3.3 & 3.5 PRO iOS app (Apple - iPad|iPhone). The vulnerability allows remote attackers to inject malicious script codes to the application-side of the vulnerable module.

Wifi Album v1.47 iOS – Command Injection Vulnerability

A local command injection web vulnerability is detected in the mobile Wifi Album v1.47 iOS app (Apple - iPad|iPhone). The vulnerability allows to inject local commands via vulnerable system values to compromise the apple mobile iOS application.

Wifi Photo Transfer 2.1 & 1.1 PRO – Multiple Vulnerabilities

A local command injection web vulnerability is detected in the mobile Wifi Photo Transfer 2.1 & 1.1 Pro app for the apple ipad & iphone. The vulnerability allows to inject local commands via vulnerable system values to compromise the apple mobile iOS application. A local file include web vulnerability is detected in the mobile Wifi Photo Transfer 2.1 & 1.1 Pro app for the apple ipad & iphone. The vulnerability allows to include local files to compromise the apple mobile iOS application.

No-IP Dynamic Update Client (DUC) 2.1.9 local IPaddress stack overflow

No-IP is probably the most used Dynamic DNS provider worldwide, their Dynamic Update Client (DUC) is present by default in tons of systems, software repositories and embedded devices. This exploit covers a stack-based overflow present in -i parameter, IPaddress variable name in source code. It is probably the most basic parameter, as this is the way to say the client that our IP has changed. For the PoC we will use the Linux x86 client version 2.1.9.

Joomla Component com_s5clanroster Sql Injection Vulnerability

A SQL injection vulnerability exists in the Joomla component com_s5clanroster. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains malicious SQL code that can be executed in the backend database. The malicious code can be used to extract sensitive information from the database, such as usernames and passwords.

Recent Exploits: