header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ad Manager Pro

Ad Manager Pro is vulnerable to SQL Injection and Cross-Site Scripting. An attacker can inject malicious code into the vulnerable parameters of the application and execute it in the user's browser. The vulnerable parameters are username, password, image_control, and email.

WireShark Buffer Overflow 0day

A buffer overflow vulnerability exists in WireShark versions 1.8.2 and 1.6.0. An attacker can exploit this vulnerability by sending a maliciously crafted string to the Remote Interface function of WireShark. This will overwrite the EAX, ECX, EDX, and EBX registers, allowing the attacker to gain access to EIP.

WebPA <= 1.1.0.1 Multiple Vulnerabilities

WebPA v1.1.0.1 is vulnerable to an arbitrary file upload vulnerability. An attacker can upload a malicious PHP file to the web server and execute arbitrary commands on the system. This vulnerability can be exploited by sending a specially crafted POST request with malicious PHP code in the filename parameter.

LetoDMS 3.3.6 Multiple Reflected/Stored XSS & Password Change CSRF Vulnerability

LetoDMS is an open-source document-management-system based on PHP and MySQL published under the GPL. There is a Reflected XSS vulnerability in the Login Page, Stored XSS vulnerability in Document Owner/User name (when viewing user document) and Stored XSS in Calendar. There is also a Change Password CSRF vulnerability.

Vice City Multiplayer remote code execution (Server)

This exploit allows a remote attacker to execute arbitrary code on a vulnerable server running Vice City Multiplayer. The exploit is triggered by sending a specially crafted packet to the server. The packet contains a buffer of 0x49 bytes followed by a pointer to the shellcode and the shellcode itself. The shellcode executes the calc.exe program.

XODA 0.4.5 Arbitrary PHP File Upload Vulnerability

This module exploits a file upload vulnerability found in XODA 0.4.5. Attackers can abuse the "upload" command in order to upload a malicious PHP file without any authentication, which results in arbitrary code execution. The module has been tested successfully on XODA 0.4.5 and Ubuntu 10.04.

E-Mail Security Virtual Appliance learn-msg.cgi Command Injection

This module exploits a command injection vulnerability found in E-Mail Security Virtual Appliance. This module abuses the learn-msg.cgi file to execute arbitrary OS commands without authentication. This module has been successfully tested on the ESVA_2057 appliance.

OpenDocMan Password Change CSRF

OpenDocMan is vulnerable to a CSRF which allows an attacker to change users password and profile details. In order to change user details the attacker must know the user id, for example; the default id for the 'admin' user is 1. The victim must be logged in while clicking the malicious link.

Recent Exploits: