header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Magneto Software Net Resource ActiveX NetFileClose SEH Overwrite POC

The vulnerability exists in the SKNetResource.ocx ActiveX control, which is part of the Magneto Software Net Resource package. The vulnerability is caused due to a boundary error within the NetFileClose() method when handling user-supplied input. This can be exploited to cause a stack-based buffer overflow by supplying a specially crafted argument to the method. This may allow an attacker to execute arbitrary code.

Magneto Software Net Resource ActiveX NetSessionDel BOF

A buffer overflow vulnerability exists in Magneto Software Net Resource ActiveX control (SKNetResource.ocx) when handling the NetSessionDel function. By supplying a large string as the second parameter, an attacker can overwrite the EAX, EBX, and SEH registers, resulting in arbitrary code execution.

Magneto Software ActiveX Control ICMP Crash POC

This exploit is a proof-of-concept for a buffer overflow vulnerability in the Magneto Software ActiveX Control. The vulnerability is triggered when the DNSLookupHostWithServer function is called with an overly long argument. This causes a crash in the application, potentially allowing for remote code execution.

Joomla Component QPersonel SQL Injection Vulnerability

QPersonel is a Joomla component vulnerable to SQL Injection. The vulnerable parameter is 'katid' which can be exploited by appending malicious SQL code to the URL. The vulnerable file is qpersonel.php. Selected information gets displayed within the title tag.

Games Script (Galore) Backup Dump Vulnerability

An attacker can exploit this vulnerability by accessing the backup directory of the Games Script (Galore) application, located at http://127.0.0.1/Games Script (Galore)/admincp/backup/ and by logging in to the admincp directory at http://127.0.0.1/Games Script (Galore)/admincp/.

joelz bulletin board <= 0.9.9rc3 multiple SQL Injection & Exploit

The vulnerability exists in the joelz bulletin board version 0.9.9rc3. An attacker can exploit the vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This can allow the attacker to gain access to sensitive information such as usernames, passwords, and emails.

Police Municipale Open Main Courante 1.01beta (RFI/LFI) Multiple File Include Vulnerability

Police Municipale Open Main Courante 1.01beta is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Recent Exploits: