header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

EasyE-Cards Multiple Input-Validation Vulnerabilities

EasyE-Cards is prone to multiple input-validation vulnerabilities, including an SQL-injection issue and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

ALLPlayer M3U Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in ALLPlayer 2.8.1, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .M3U file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This module has been tested successfully on Windows 7 SP1.

Drunken:Golem Gaming Portal (root_path) Remote File Include Exploit

This exploit allows an attacker to remotely include a file in the Drunken:Golem Gaming Portal, version 1.2. By manipulating the 'root_path' parameter in the 'phpIRC.php' script, an attacker can execute arbitrary code on the target system. The exploit uses a shell located at 'http://pang0.by.ru/shall/pang057.zz' to execute commands.

ACGVclick <= 0.2.0 (path) Remote File Include Vulnerability

The ACGVclick version 0.2.0 is vulnerable to a remote file inclusion vulnerability. This vulnerability allows an attacker to include arbitrary files from a remote server by manipulating the 'path' parameter in the 'function.inc.php' file. By exploiting this vulnerability, an attacker can execute malicious code on the target system.

Proof of concept exploit for ZDI – Citrix Metaframe spooler service vulnerability

This is a proof of concept exploit for the ZDI - Citrix Metaframe spooler service vulnerability. The exploit targets the EnumPrinter() and EnumPrinterW() functions in the Microsoft Windows operating system. It is designed to fuzz local printer providers and potentially identify similar vulnerabilities. When executed on a vulnerable system, the exploit will kill the spooler service (spoolsv.exe) and overwrite the ret value with 0x00410041. This initial version of the exploit has been tested against Windows Server 2003 with Citrix Presentation Server. The 514 Tiger Team is credited with creating this exploit.

Recent Exploits: