header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mojoportal Multiple Remote Vulnerabilities

With This vulnerability you can feed the malicious link to Admin of site (when he is already logged in) to move a file with Administrator Privilege. In this path you can find a method that move files to any path: http://Example.com/Services/FileService.ashx. With this command we can move user.config file to user.config.aaa: http://Example.com/Services/FileService.ashx?cmd=movefile&srcPath=./../../../user.config&destPath=./../../../user.config.aaa and then we can download it from URL: http://Example.com/user.config.aaa. This vulnerability can be exploited by an attacker to inject malicious script code in the application. The attacker can inject malicious script code in the application by using the 'Name' parameter in the 'Add New User' page.

Chalk Creek Media Player 1.0.7 .mp3 and .wma DOS

Chalk Creek Media Player 1.0.7 is vulnerable to a Denial of Service attack when a specially crafted .wma or .mp3 file is opened. The attack can be triggered by launching the application and selecting the specially crafted file. The attack causes the application to crash.

Integard Pro 2.2.0.9026 (Win7 ROP-Code Metasploit Module)

This module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.

MP3 Workstation Version 9.2.1.1.2 SEH exploit

A SEH exploit exists in MP3 Workstation Version 9.2.1.1.2 due to a lack of proper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted .pls file to the application, which will cause a buffer overflow and allow the attacker to execute arbitrary code. The vulnerability was discovered by Sanjeev Gupta and tested on Windows XP SP2.

Ipswitch Imail Server List Mailer Reply-To Address memory corruption

A memory corruption vulnerability exists in Ipswitch Imail Server List Mailer Reply-To Address due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted email to the vulnerable server. This can allow the attacker to execute arbitrary code in the context of the application.

eNdonesia 8.4 (Print Module) SQL Injection Vulnerability

eNdonesia 8.4 is vulnerable to a SQL injection vulnerability in the print module. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a malicious SQL query that can be used to extract sensitive information from the database.

IBM Lotus Domino iCalendar Email Address Stack Buffer Overflow Vulnerability

An unauthenticated remote code execution vulnerability was identified in the code handling the conversion and checking of an iCalendar email address parameter. An overly large email address string can lead to the overflow of a stack allocated buffer due to insufficient bounds checking when a CStrcpy (string copy) is performed. A remote, unauthenticated attacker could execute code in the context of the Lotus Domino server process (nrouter.exe) by sending a specially crafted malicious email to the Lotus Domino SMTP server.

[0-Day] E-Xoopport – Samsara <= v3.1 (Sections Module 2) Remote Blind SQL Injection Exploit

E-Xoopport is vulnerable to a Remote Blind SQL Injection vulnerability in the Sections Module. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. This vulnerability affects versions 3.1 and earlier.

FreeDiscussionForums Multiple Remote Vulnerabilities

This version of FreeDiscussionForums have Multiple Valnerabilities : Access to Admin's Section and Persistent XSS. With this path you can easily access to Admin's section: http://Example.com/ManageSubject.aspx. Valnerable Code : DLL : App_Web_wngcbiby.dll, Class : Class adminlogin. In this application also there is a Persistent XSS exist in title field. Valnerable Code : DLL : App_Web_wngcbiby.dll, Class : Class AddPost

Recent Exploits: