header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Logicspice FAQ Script 2.9.7 – Remote Code Execution

Logicspice FAQ Script 2.9.7 allows to upload arbitrary files which leads to a remote command execution on the remote server. An attacker can create a file with a malicious PHP code and upload it to the server via the admin portal. The attacker can then execute arbitrary commands on the server by accessing the uploaded file with a GET request.

Trend Micro Virtual Mobile Infrastructure 5.5.1336 – ‘Server address’ Denial of Service (PoC)

The vulnerability exists due to a boundary error when handling user-supplied input in the 'Server address' field. A remote attacker can create a specially crafted input, send it to the vulnerable application and execute arbitrary code on the system. An attacker can exploit this vulnerability to cause a denial of service condition.

Symantec Mobile Encryption for iPhone 2.1.0 – ‘Server’ Denial of Service (PoC)

The vulnerability exists due to a boundary error when handling user-supplied input. A remote attacker can send a specially crafted input to the vulnerable application, causing a denial of service condition. To exploit the vulnerability, an attacker must send a specially crafted input to the vulnerable application.

Visual Ping 0.8.0.0 – ‘Host’ Denial of Service (PoC)

Visual Ping 0.8.0.0 is vulnerable to a denial of service attack when the user inputs a specially crafted string into the 'Host, Time Out,packet size, Pause, Loops' fields. An attacker can exploit this vulnerability by executing the Visual_Ping.py code, copying the contents of VisualPing.txt to the clipboard, executing VPing.exe, and then copying the clipboard contents into the 'Host, Time Out,packet size, Pause, Loops' fields. When the 'Start' button is clicked, the application will crash.

Recent Exploits: