header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OpenSiteAdmin 0.9.7 BETA Remote File Include Vulnerability

The OpenSiteAdmin 0.9.7 BETA version is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by injecting a malicious file path in the 'path' parameter of the 'pageHeader.php' file. This allows the attacker to include and execute arbitrary files on the server.

Quiksoft EasyMail 6 (AddAttachment) Remote Buffer Overflow Exploit

This exploit takes advantage of a remote buffer overflow vulnerability in Quiksoft EasyMail 6. The vulnerable method is AddAttachment. The latest version of the software does not support this method. The exploit was created out of boredom and interest sparked by a similar post. For more details, refer to the advisory at http://www.bmgsec.com.au/advisory/48/.

golden ftp 2.52.0.0 remote r00t exploit

This exploit allows an attacker to gain remote root access by exploiting a stack overflow vulnerability in Golden FTPd. The exploit code binds port 4444 on the remote machine. If the return address is not correct, the FTPd will crash and the administrator will have trouble restarting it. The code must be executed, and the FTPd must be restarted or shutdown for it to work.

SAP player 0.9 (.pla) Universal Local BoF Exploit (SEH)

This is a buffer overflow exploit for SAP player 0.9 (.pla) that allows for arbitrary code execution. It exploits a vulnerability in the software's handling of .pla files, triggering a stack-based buffer overflow. By crafting a malicious .pla file, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program's execution flow.

Golden FTP Server Pro remote stack BOF exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable Golden FTP Server Pro version 2.5.0.0 and prior. By sending a specially crafted overflow string to the server, an attacker can gain a shell on port 4444. The exploit has been tested on Windows XP SP1 and SP2. Restarting the server is required after the exploit is successful. The workaround is to upgrade to a newer version or use another FTP server.

Recent Exploits: