header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHPBB Minerva Mod <= 2.0.21 build 238a (forum.php) Remote SQL Injection Exploit

This exploit allows an attacker to perform a remote SQL injection on PHPBB Minerva Mod version 2.0.21 build 238a through the 'forum.php' file. The vulnerability allows the attacker to extract the user password from the 'minerva_users' table by manipulating the 'user_id' parameter.

Modulo Splatt Forum v4.0 RC1(bbcode_ref.php name)Local File Include Exploit

This exploit allows an attacker to include local files on the server by manipulating the 'name' parameter in the 'bbcode_ref.php' script of Modulo Splatt Forum v4.0 RC1. The vulnerable code can be found on line 17 and 19 of the script. By including certain files, an attacker can potentially view sensitive information such as log files.

i.Mage Local Crash Poc

This exploit creates a vulnerable image.xml file that can cause a crash in i.Mage software. The vulnerability is caused by an access violation when reading a specific memory address. The exploit author has provided a proof of concept code that fills the image.xml file with a large number of 'A' characters, causing the crash. It is recommended to copy the image.xml file to the installation directory of i.Mage software and start the application to trigger the crash.

i-FTP Buffer Overflow SEH

This exploit takes advantage of a buffer overflow vulnerability in i-FTP v2.20, allowing an attacker to execute arbitrary code. The exploit uses a return address overwrite technique to redirect program execution flow to the attacker's shellcode. The shellcode payload used in this exploit spawns the Windows calculator. The exploit has been tested on various Windows platforms, including Win7 32bit, Win8.1 64bit, and Win XPsp3.

GIMP Multiple Remote Stack-based Buffer Overflow Vulnerabilities

GIMP is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate checks on user-supplied input. Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

MetaForum <= 0.513 Beta - Remote file upload Vulnerability

A security bug has been discovered in MetaForum 0.513 Beta. This bug can be used by an attacker to upload a malicious php file on the server. During the upload, the MIME type of the file is the only verified parameter. The extension isn't. This enables an attacker to fake the MIME type of a php file so that it is considered as an image.

Recent Exploits: