header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer 7.0 Beta 2 urlmon.dll DoS

This vulnerability allows remote attackers to cause a denial of service (application crash) via a long string in the SRC attribute of a BGSOUND element. This vulnerability affects Internet Explorer 7.0 Beta 2 when running on Windows XP SP2. The vulnerability is due to a boundary error within the urlmon.dll library when processing a long string in the SRC attribute of a BGSOUND element. This can be exploited to cause a stack-based buffer overflow by tricking a user into visiting a malicious web page.

SQL Injection Exploit for ASPThai.Net Guestbook <= 5.5

This exploit shows the username of the administrator and the password In plain text. It uses LWP::UserAgent and HTTP::Cookies to login and store a cookie to view the admin panel later. It then creates a request and checks the outcome of the response to get the username and password.

MyQuiz Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'ask' parameter of the 'myquiz.pl' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious commands to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary command execution on the vulnerable system.

IPB Portal 1.3 SQL injection Get Hash Exploit

This exploit allows an attacker to gain access to the MD5 hash of a user's password by exploiting a SQL injection vulnerability in IPB Portal 1.3. The vulnerability exists in the 'index.php' file, which allows an attacker to inject malicious SQL code into the 'act' and 'site' parameters. By exploiting this vulnerability, an attacker can gain access to the MD5 hash of a user's password.

Cisco Killer – ciskill.c

This exploit takes advantage of a vulnerability that was discovered by Eric Smith on January 12, 2006 (bid:16217). The vulnerability exists in the way the affected versions of Cisco Aironet 350 IOS, Cisco Aironet 1400, Cisco Aironet 1300, Cisco Aironet 1240AG, Cisco Aironet 1230AG, Cisco Aironet 1200, Cisco Aironet 1130AG, and Cisco Aironet 1100 handle ARP replies. If enough specially crafted ARP packets are sent on the network with the affected systems, it will cause the access point memory exhaustion which will in a few seconds (depending on the speed of the attacker and the memory of the target) crash the system, making all ingoing/outgoing traffic stopped.

Recent Exploits: