header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sam Spade 1.14 Scan from IP address Field Exploit

This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in Sam Spade 1.14. The vulnerability occurs when processing input from the 'Scan from IP addresses' input field. By providing a specially crafted input, an attacker can overwrite the return address and gain control of the program's execution flow.

An open security advisory #6 – Xine vcd MRL input identifier management overflow

There is a generic stack-based buffer overflow in all versions of Xine-lib, including Xine-lib-rc5, that allows for local and remote malicious code execution. By overflowing the vcd:// input source identifier buffer, it is possible to modify the instruction pointer with a value that a malicious attacker can control.

Symantec pcAnywhere v12.5.0 Windows x86 RCE

The application's module used for handling incoming connections contains a flaw. When handling authentication requests, the vulnerable process copies user provided input to a fixed length buffer without performing a length check. A remote unauthenticated attacker can exploit this vulnerability to cause a buffer overflow and execute arbitrary code in the context of the exploited application (installed as a service by default, i.e. with "NT AUTHORITYSYSTEM" privileges).

et-chat Privilege Escalation and Arbitrary Shell Upload Vulnerabilities

An attacker can exploit these vulnerabilities in et-chat 3.07 and potentially other versions to gain elevated privileges within the application and upload arbitrary shells. This could lead to arbitrary code execution within the context of the vulnerable application.

PHP Server Monitor 3.1.1 Cross Site Request Forgery (CSRF) Vulnerability

Multiple CSRF issues in PHP Server Monitor allow remote attackers to add arbitrary users & servers to the system, modify system configurations and delete arbitrary servers, if user (admin) is logged in and visits our malicious website or clicks on our infected links. As no CSRF protection is used in the application, we can make requests on the victim's behalf and the server will happily oblige processing our malicious HTTP requests.

Max Forum Multiple Input-Validation Vulnerabilities

Max Forum is prone to multiple input-validation vulnerabilities including a PHP code-execution vulnerability, a local file-include vulnerability and an information-disclosure because it fails to properly sanitize user-supplied input.An attacker can exploit these issues to inject arbitrary PHP code and include and execute arbitrary files from the vulnerable system in the context of the affected application and to obtain sensitive information that may aid in further attacks.

Recent Exploits: