header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vermillion FTP Deamon Remote BOF Exploit

This exploit is a buffer overflow vulnerability in Vermillion FTP Deamon version 1.31. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted payload to the FTP server. The payload contains shellcode and a series of commands that overwrite the return address of the vulnerable function with the address of the shellcode.

Xerox Workcenter 4150 Remote Buffer Overflow

During a brief assessment performed on a Xerox WorkCentre 4150 it was discovered that PJL daemon implementation contains a weakness related to robustness of PJL protocol handling. Attacker can crash the service with a relatively simple attack. Recovering from the denial-of-service condition requires power cycling the device. Due to the black box nature of this Proof of concept attack, we are unable to know if remote code execution is possible.

phpunity.newsmanager – Local file inclusion

A Local File Inclusion vulnerability exists in phpunity.newsmanager, which allows an attacker to include a file from the local system. This can be exploited to view sensitive files on the system by including files from the web root folder or by exploiting a vulnerability in an included file. The vulnerability is located in the 'id' parameter of the 'tell.php' script. An attacker can send a specially crafted request to the vulnerable script and include a file from the local system.

Joomla Component com_dms Remote SQL injection vulnerability – (category_id)

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'category_id' in the URL. This can be done by appending a malicious SQL query to the vulnerable parameter in the URL. This can be done by appending a malicious SQL query to the vulnerable parameter in the URL. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

PHP Product Catalog – [ CSRF ] Change Administrator Password

A Cross-Site Request Forgery (CSRF) vulnerability exists in the PHP Product Catalog application, which allows an attacker to change the administrator password. An attacker can craft a malicious HTML page containing a form with the necessary parameters to change the administrator password. When the administrator visits the malicious page, the form will be automatically submitted, and the administrator password will be changed.

Joomla Component com_ccnewsletter Local File Inclusion

A vulnerability in Joomla Component com_ccnewsletter allows an attacker to include a local file via a specially crafted URL. The attacker can send a request to the vulnerable server with a malicious URL containing a path traversal string (e.g. ../../../../../../../../../../etc/passwd%00) which will allow the attacker to read the contents of the file.

Recent Exploits: