header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sami HTTP Server Denial-of-Service Vulnerability

The vulnerability allows remote attackers to crash the Sami HTTP Server application, denying further service to legitimate users. By sending a large number of requests to non-existent files, pages, or folders, the server becomes unresponsive and stops writing to log files. The admin will be unable to manage or ban users, and the only solution is to kill the process.

Heap Overflow vulnerability in Transmit 3

Transmit 3 is prone to a heap-overflow vulnerability because it fails to perform sufficient boundary checks on user-supplied data before copying it to a buffer. An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system.

DeepBurner <= 1.8.0 dbr parsing remote buffer overflow

This exploit allows an attacker to trigger a buffer overflow in the 'file name' tag of the dbr file, resulting in an access violation and the ability to overwrite the SEH handler. The stack can be corrupted, but a jmpover can be used to avoid this. The exploit uses a specific RETcode type: POP REG, POP REG, RET. It is recommended to search for your own RETcodes to improve reliability.

MS04011 Lsasrv.dll RPC buffer overflow remote exploit

This exploit targets a buffer overflow vulnerability in the Lsasrv.dll RPC service. It allows remote attackers to execute arbitrary code on the vulnerable system. The exploit requires the target IP, victim IP, and bindport to be specified. Optionally, a connectback IP can also be provided. The exploit supports multiple targets including Windows XP Professional and Windows 2000 Professional. It also has an option to detect the remote operating system. The exploit has been tested on various versions of Windows XP Professional and Windows 2000 Professional.

HTML-injection vulnerability in SMF

SMF is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. NOTE: To trigger this vulnerability, the attacker must log in with a valid account.

Easebay Resources Paypal Subscription Manager Multiple Input-Validation Vulnerabilities

The application is prone to multiple input-validation vulnerabilities including an SQL-injection issue and a cross-site scripting issue. Exploiting these vulnerabilities could lead to various consequences such as stealing authentication credentials, compromising the application, retrieving sensitive information, accessing or modifying data, or exploiting latent vulnerability in the underlying database implementation.

ArsDigita Community System Directory Traversal Vulnerability

The ArsDigita Community System is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

Cross-Site Scripting Vulnerabilities in MyBloggie

MyBloggie is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in MyBloggie

MyBloggie is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: