header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer Overflow in ConnectWithString() Function

A buffer overflow vulnerability exists in the ConnectWithString() function of the program. The vulnerability is caused due to a lack of proper validation of user-supplied input when handling the 'string' argument. An attacker can exploit this vulnerability by supplying a specially crafted string argument to the ConnectWithString() function, resulting in a buffer overflow and potentially allowing arbitrary code execution.

ActFax Server (LPD/LPR) Remote Buffer Overflow Exploit

ActFax Server is vulnerable to a remote buffer overflow exploit. The exploit is triggered when a malicious payload is sent to the server via the LPD/LPR protocol. The payload contains an egghunter EDI encoded shellcode which is then executed on the vulnerable system. This exploit was discovered by chap0 in 2011 and affects ActFax Server version 4.25, Build 0221 (2010-02-11).

PHPCollab v2.x / NetOffice v2.x sendpassword.php SQL Injection

A vulnerability exists in PHPCollab v2.x and NetOffice v2.x in the 'forgotten password' feature, where an attacker can send themselves the admin (md5(), crypt() or plain text) password by submitting a 'loginForm' POST value to the general/sendpassword.php script.

Buffer Overflow in the Windows Sockets library <= v1.1 (WSOCK32.DLL)

A buffer overflow vulnerability exists in the Windows Sockets library <= v1.1 (WSOCK32.DLL) which can be exploited by sending a specially crafted packet to the vulnerable system. Successful exploitation could allow an attacker to execute arbitrary code on the target system.

CuteNews 1.4.1 (CutePHP.com) Hash password Finder

CuteNews 1.4.1 (and Below) is vulnerable to a Remote Code Execution vulnerability. This vulnerability allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'command' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable system.

php ticket <= 0.71 exploit (privilege escalation)

This exploit is used to gain administrative access to a website running php ticket version 0.71 or lower. The exploit works by sending two POST requests to the search.php page with the user's credentials. If the exploit is successful, the user will be redirected to the admin page.

Recent Exploits: