header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nokia Symbian S60v3 WebBrowser Remote DoS PoC

Nishant Das Patnaik discovered multiple vulnerabilities in the Web Browser of the high end smartphones manufactured by Nokia running Symbian OS 3rd Edition. Attacker may exploit this flaw to make crash the browser of the victim or exhaust memory available to the browser.

Dachooch Remote Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request contains a malicious SQL query in the form of a UNION statement that is appended to the original query. This statement allows the attacker to extract data from the database, such as usernames, passwords, and email addresses.

Multiple Vulnerablities in cmsmadesimple

Multiple vulnerabilities exist in cmsmadesimple, including XSS and Local File Inclusion. XSS can be exploited by sending a malicious URL to the victim, such as http://localhost/cmsmadesimple/index.php?page=tags-in-the-core&showtemplate=false"><script>alert('XSS')</script>. Local File Inclusion can be exploited by sending a malicious URL to the victim, such as http://server/cmsmadesimple/index.php?mact=News%2ccntnt01%2c%5c..%5c..%5c%5c..%5c..%5c%5c..%5c..%5c%5c..%5c..%5c%5cboot.ini%00%2c0&cntnt01articleid=1&cntnt01showtemplate=false&cntnt01returnid=39

Open & Compact FTPd Pre-Authentication Remote Exploit

This exploit is a pre-authentication remote exploit for Open & Compact FTPd. It was originally discovered by loneferret and tested on XPSP2. The exploit is written in Python and uses a shellcode to gain access to the system. The shellcode is encoded using the shikata_ga_nai encoder and is 369 bytes in size. The exploit sends a malicious MKD command to the FTP server, which then triggers the buffer overflow and executes the shellcode.

Alqatari group Version 1.0 Blind SQL Injection Vulnerability

Alqatari group Version 1.0 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the server. The attacker can use the true/false condition to check if the query is valid or not. For example, sending a request with 'id=246 and 1=1' will return true and 'id=246 and 1=2' will return false.

Izumi <= 1.1.0 (RFI/LFI) Multiple Include Vulnerability

Izumi version 1.1.0 and below is vulnerable to Remote File Inclusion (RFI) and Local File Inclusion (LFI) attacks. The vulnerability exists in the page.php file, which allows an attacker to include malicious files from remote or local sources. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious file path in the dir_install and dir_src parameters.

Infragistics WebHtmlEditor.v7.1(InitialDirectory,iged_uploadid ) directory Traversal and Arbitrary File upload vulnerability

A directory traversal vulnerability exists in Infragistics WebHtmlEditor.v7.1 which allows a remote user to view files local to the target server. The parameters of the InitialDirectory ( InitialDirectory =../../ ) can be manipulated to enable directory travel. Additionally, the parameters of the InsertImage the iged_uploadid can be changed to enable Arbitrary File upload.

CastRipper 2.50.70 : ASX playlist Stack Overflow Exploit

This exploit is for CastRipper 2.50.70, which is vulnerable to a stack overflow vulnerability. The exploit is written in Perl and uses a PexAlphaNum encoder to generate a shellcode. The exploit creates an ASX playlist file with a malicious URL containing the shellcode, which when opened in CastRipper, will execute the shellcode.

Recent Exploits: