header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mercury-4444-multi.pl Remote Buffer Overflow Vulnerability

This script is a perl exploit for the Mercury Mail Transport System. It exploits a remote buffer overflow vulnerability to execute arbitrary code on the target system. The vulnerability exists in the handling of the -o command line option. By providing a long argument to this option, an attacker can overflow a buffer and overwrite the return address, leading to remote code execution. The exploit supports multiple versions of Windows, including Windows 2000 SP4 and Windows XP SP1.

Multiple vulnerabilities in Gazette Edition for WordPress

The Gazette Edition for Wordpress is prone to multiple security vulnerabilities. These vulnerabilities include multiple denial-of-service vulnerabilities, a cross-site scripting vulnerability, and an information-disclosure vulnerability. Exploiting these issues could allow an attacker to deny service to legitimate users, gain access to sensitive information, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.

WordPress Spellchecker Plugin File Inclusion Vulnerability

The Spellchecker plugin for WordPress is prone to a local file-include vulnerability and a remote file-include vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploiting these issues may allow an attacker to execute arbitrary local and remote scripts in the context of the webserver process or obtain potentially sensitive information. This may result in a compromise of the application and the underlying system; other attacks are also possible.

MIT Kerberos kadmind Remote Code Execution Vulnerability

The MIT Kerberos kadmind service is prone to a remote code-execution vulnerability. An attacker can exploit this vulnerability to execute arbitrary code with superuser privileges. Failed attempts will cause the affected application to crash, denying service to legitimate users. A successful exploit will completely compromise affected computers.

Etki Video Pro Multiple SQL Injection Vulnerabilities

The Etki Video Pro application is prone to multiple SQL-injection vulnerabilities due to improper input sanitization before using it in an SQL query. These vulnerabilities can be exploited by attackers to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Etki Video Pro SQL Injection Vulnerabilities

Etki Video Pro is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Recent Exploits: