header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Articles One Remote File Inclusion Vulnerability

Articles One is prone to a remote file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote Web servers that may contain malicious code and execute it in the context of the Web server process.

MoSpray Remote File Include Vulnerability

MoSpray is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

D-Link Router UPNP DOS PoC

A remote stack overflow exists in a range of wired and wireless D-Link routers. This vulnerability allows an attacker to execute privileged code on an affected device. Although a stack overflow does exist, debugging this vulnerabilty requires additional external hardware.

phpforge3b2(cfg_racine) Remote File Inclusion Vulnerability

A vulnerability exists in phpforge3b2(cfg_racine) which allows an attacker to include a remote file by manipulating the 'cfg_racine' parameter in a vulnerable URL. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system with the privileges of the webserver process.

Microsoft SRV.SYS Mailslot Ring0 Memory Corruption(MS06-035) Exploit

This exploit is used to exploit a vulnerability in Microsoft SRV.SYS Mailslot Ring0 Memory Corruption (MS06-035). It uses a series of crafted packets to send to the target system, which can lead to a denial of service or remote code execution.

Microsoft IIS ASP Stack Overflow Exploit(MS06-034)

This exploit is a stack overflow vulnerability in Microsoft IIS ASP. It allows an attacker to execute arbitrary code on the vulnerable system by uploading a malicious ASP file. The exploit was tested on Windows 2000 Server SP4+IIS5.0 and Windows 2003 Server+IIS6.0.

Recent Exploits: