header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

@lex Guestbook Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the target system through the @lex Guestbook <= 4.0.2 application. By exploiting a local file inclusion vulnerability, the attacker can include a malicious skin file that contains the desired command to be executed. The exploit retrieves the administrator password, logs in as the administrator, adds a skin, and writes the malicious skin file. The command executed in this example is 'whoami', which returns the username 'darkfig'.

Fortinet Fortigate URL Filtering Bypass

An attacker can bypass Fortinet Fortigate's URL filtering functionality by sending specially-crafted HTTP requests terminated by the CRLF character and changing the HTTP version to 1.0 without sending the Host header and fragmenting the GET and POST requests. This allows the attacker to view unauthorized websites and bypass certain security restrictions.

Exploit Of The Apes

This is a practical pwnage exploit for Application (UN)Enhancer, also known as APU. The exploit involves patching certain opcodes in the binary file of the framework to gain unauthorized access and control. The exploit targets the ApplicationEnhancer.framework and ApplicationUnenhancer.framework.

Opera JPEG processing – Heap corruption vulnerabilities

Opera is vulnerable in parsing the JPEG file format. Discovered were four vulnerabilities, each in different segments of the file format. The two important ones are ntdll.RtlAllocateHeap() DHT vulnerability and ntdll.RtlAllocateHeap() SOS vulnerability. Opera Mini for mobile phones could also be vulnerable.

magic photo storage website — Remote File Inclusion

The magic photo storage website is vulnerable to Remote File Inclusion. An attacker can exploit this vulnerability by injecting a malicious payload in the _config[site_path] parameter of the common_function.php file. This allows the attacker to include arbitrary remote files, potentially leading to remote code execution or sensitive data disclosure.

Recent Exploits: