header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MiNT Haber Sistemi v2.7 (tr) == SQL Injection Vulnerability

The MiNT Haber Sistemi v2.7 (tr) is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting SQL code into the 'id' parameter in the 'duyuru.asp' page. By doing so, they can retrieve sensitive information such as the admin's username, password, and email address.

Norton AntiVirus Denial Of Service Vulnerability

While scanning specially crafted compressed files, Norton AntiVirus triggers a Denial of Service (DoS) attack by using 100% CPU for a long time. The scan cannot be stopped manually, forcing the user to kill the process. A proof of concept file is provided to demonstrate the vulnerability. Other antivirus or trojan scanners may also be vulnerable.

Citations Aléatoires v1.1

The vulnerability exists in the /i-accueil.php file of the Citations Aléatoires v1.1 script. The script includes a file without properly validating user-supplied input, allowing an attacker to include arbitrary remote files. This can lead to remote code execution and compromise of the affected system.

Buffer Overflow in MW6MaxiCode Class

The Data parameter in the MW6MaxiCode Class is subject to a buffer overflow, leading to arbitrary code execution. By entering a string larger than 4000 characters, it is possible to trigger the overflow. This results in Internet Explorer crashing when trying to copy 42424242 to a register. By disassembling near the crash location, it can be observed that both EAX and ECX can be manipulated with values 41414141 and 42424242 respectively. These manipulated values are later used to perform write operations, leading to an arbitrary 4 byte write.

Buffer Overflow Vulnerability in MW6Aztec ActiveX

The Data parameter in the MW6Aztec ActiveX COM Object is subject to a buffer overflow, leading to arbitrary code execution. By entering a string larger than 9000 characters, the attached PoC (mw6maztec.html) crashes when trying to read from address 41414141. Further investigation reveals that the value of EAX 030e20d0 is written into an arbitrary memory location, and this EAX value is pointing to the Data buffer.

WinIPDS Directory Traversal and Denial-of-Service Vulnerabilities

The directory traversal vulnerability in WinIPDS allows an attacker to gain access to sensitive information by manipulating directory paths. The denial-of-service vulnerability allows an attacker to crash the application, denying service to legitimate users. The vulnerabilities can be exploited by sending specially crafted GET or POST requests with manipulated directory paths.

sNews <= 1.5.30 unauthorized access / reset admin pass / cmd exec exploit

This exploit allows an attacker to gain unauthorized access, reset the admin password, and execute arbitrary commands on a vulnerable sNews <= 1.5.30 installation. The exploit works regardless of php.ini settings. The attacker needs to provide the target server, path to sNews, their IP address, and a shell command. Options include specifying a different port or using a proxy. The exploit sends a packet to the target server and if successful, gains unauthorized access, resets the admin password, and executes the specified command.

Recent Exploits: