header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MyPHPCommander Remote Code Execution

The vulnerability exists in the package.php file of MyPHPCommander. It is caused by the insecure usage of the gl_root parameter, which can be exploited to execute arbitrary PHP code remotely. An attacker can inject a malicious command through the gl_root parameter, leading to remote code execution on the server.

Proof of Concept for MOAB-25-01-2007

This script demonstrates a proof of concept for the MOAB-25-01-2007 vulnerability. It starts an HTTP server on the specified port (default 80) and waits for incoming connections. When a connection is made, it generates a random content length and extracts the user agent from the request. It then responds with a 301 redirect to a non-existent URL and sends a response body filled with 'X' characters of the random content length. This vulnerability can be used for HTTP server redirection attacks.

Buffer Overflow in .ShellClassInfo

This exploit takes advantage of a buffer overflow vulnerability in the .ShellClassInfo section of the Windows operating system. It allows an attacker to execute arbitrary code by providing a specially crafted URL. The exploit contains shellcode that downloads and executes additional code from a remote location.

VCDGEAR 3.50 Stack-based Buffer Overflow Vulnerability

VCDGEAR 3.50 is prone to a stack-based buffer overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Total Video Player 1.3.1 (Settings.ini) – SEH Buffer Overflow

This module exploits a buffer overflow in Total Video Player 1.3.1. The vulnerability occurs opening malformed Settings.ini file e.g."C:Program FilesTotal Video Player". This module has been tested successfully over Windows WinXp-Sp3-EN

GE Proficy CIMPLICITY gefebt.exe Remote Code Execution

This module abuses the gefebt.exe component in GE Proficy CIMPLICITY, reachable through the CIMPLICITY CimWebServer. The vulnerable component allows to execute remote BCL files in shared resources. An attacker can abuse this behaviour to execute a malicious BCL and drop an arbitrary EXE. The last one can be executed remotely through the WebView server. This module has been tested successfully in GE Proficy CIMPLICITY 7.5 with the embedded CimWebServer. This module starts a WebDAV server to provide the malicious BCL files. When the target hasn't the WebClient service enabled, an external SMB service is necessary.

Recent Exploits: