header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bad “VML” Remote DoS on Safari for iPhone & iPod Touch

An attacker may direct the user to visit a specially crafted webpage that can lead the Safari browser on iPhone & iPod Touch running iPhone OS 3.1.3 to freeze and finally crash. The attacker can modify to the PoC to run arbitrary code on the device.

Flirt Matching SMS System <= SQL Injection Exploit

An attacker can exploit this vulnerability by sending a maliciously crafted SQL query to the vulnerable application. This can be done by appending the malicious query to the vulnerable parameter in the URL. This can allow an attacker to gain access to sensitive information such as usernames, passwords, and emails.

Security vulnerability found in SAP GUI 7.10 and BI 7.0 that allows operating system functions to be called remotely.

Insecure method was founded in SAPBExCommonResources (class BExGlobal) activeX control component which is a part of SAP GUI. One of the methods (Execute) can be used to execute files on users system. Attacker can construct html page which call vulnerable function 'Execute' from ActiveX Object BExGlobal.

eDisplay Personal FTP server 1.0.0 Multiple Post-Authentication Stack BOF

eDisplay Personal FTP server 1.0.0 is vulnerable to a stack-based buffer overflow vulnerability when sending an overly long string to the RMD command. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.

justVisual 2.0 (index.php) Local File Vulnerability

justVisual 2.0 is vulnerable to a Local File Inclusion (LFI) vulnerability. This vulnerability is caused due to the use of unsanitized user-supplied input in the 'p' parameter of the 'index.php' script. An attacker can exploit this vulnerability to include arbitrary local files from the web server and execute arbitrary PHP code.

Easy-Clanpage <= v2.01 SQL Injection Exploit

Easy-Clanpage is vulnerable to a SQL injection vulnerability in the 'id' parameter of the 'user' section. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, and emails. The exploit can be triggered by sending a specially crafted HTTP request to the vulnerable application.

Recent Exploits: