header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

local PoC exploit for AIM 5.5.3595

This is a local Proof of Concept (PoC) exploit for AIM version 5.5.3595. It exploits a buffer overflow vulnerability in the AIM software and allows an attacker to execute arbitrary code on the target system. The exploit creates a bindshell on port 1180 and can be triggered by supplying a command-line argument. If no argument is provided, it prints the URL. This exploit is NT universal, meaning it can be used on Windows NT-based systems.

MolyX BOARD 2.5.0 Local File Inclusion

This vulnerability allows an attacker to include local files on the server by manipulating the 'lang' parameter in the 'index.php' file. By using a relative path traversal technique, an attacker can access sensitive files such as the '/etc/passwd' file. This vulnerability affects all files within the MolyX BOARD 2.5.0 web application.

Extra User Details [Privilege Escalation]

Extra User Details plugin for WordPress suffers from a Privilege Escalation vulnerability. The plugin hooks the eud_update_ExtraFields function to profile_update WordPress action. This function doesn't properly check user capabilities and updates all meta information passed to post data. An attacker can exploit this misbehavior to gain administrative privileges.

Dell OpenManage Server Administrator 8.2 Authenticated Directory Traversal

When authenticated as an admin, an attacker can manipulate the URL to access arbitrary files on the server. By substituting the target IP, desired file path, and session-specific vid parameter, the attacker can bypass security controls and view sensitive files.

bif3-0.4.1 <= Remote File Include Vulnerability

This vulnerability allows remote attackers to include arbitrary files via a crafted request to the Base/Application.php, Widgets/Base/Footer.php, Widgets/Base/widget.BifContainer.php, Widgets/Base/widget.BifRoot.php, Widgets/Base/widget.BifRoot2.php, Widgets/Base/widget.BifRoot3.php, or Widgets/Base/widget.BifWarning.php script.

Recent Exploits: