header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IP.Board 2.2.1 SQL Injection

This exploit allows an attacker to gain access to a user's account by exploiting a SQL injection vulnerability in IP.Board 2.2.1. The attacker can use the vulnerability to inject a malicious SQL query into the application, which can be used to extract the user's password hash from the database. The attacker can then use the hash to log in to the user's account.

deV!L`z Clanportal Arbitrary File Upload Vulnerability

deV!L`z Clanportal (short "DZCP") is a suite of PHP scripts that allow anybody to create a feature-rich website for her online gaming clan. The attacker can run own code on the web sever with the same privileges as DZCP itself, enabling her to do almost anything from getting the MySQL password to hosting own files and scripts or getting a shell on the server. The attacker needs a file that is both a valid JPEG or GIF file and valid PHP (or probably other) code.

NetBSD ftpd and ports *Remote ROOOOOT $HOLE$*

The NetBSD ftpd and the tnftpd port suffer from a remote stack overrun, which can lead to a root compromise. The bug is in glob.c file. The globbing mechanism is flawed as back in 2001. To trigger the overflow, an attacker can create a folder and use the globbing special characters (like STARS) to overflow an internal stack based buffer.

VUPlayer <= 2.44 m3u parsing remote buffer overflow

A classical buffer overflow. if we supply less than 800 bytes of buffer we can trigger an access violation and we can overwrite SEH handler. btw stack gets too much contaminated with lowecase transforming, section repetitions and a lot of bad things that make exploiting quite impossible. Well... if we make it eat a thousand of bytes we can really overwrite some juicy RET sections and full controlling EIP.

LDU <= 8.x (polls.php) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in LDU <= 8.x. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, modify data, execute system commands, and even gain access to the underlying server.

CakePHP Directory Traversal Vulnerability

CakePHP is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

evince-ps-field-bof.c

evince-ps-field-bof.c is a C program created by K-sPecial (xzziroz.net) of .aware (awarenetwork.org) in 2006. It is a buffer overflow exploit for Evince, a document viewer. The exploit is triggered when a maliciously crafted PostScript file is opened in Evince. The exploit uses a shellcode from Metasploit to gain remote access to the system. The shellcode must be set to Encoder=None for it to work.

Recent Exploits: