header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XAMPP for Windows <= 1.6.0a adodb.php/mssql_connect() remote buffer overflow

This is a proof-of-concept exploit for a remote buffer overflow vulnerability in XAMPP for Windows version 1.6.0a. The vulnerability exists in the adodb.php file, specifically in the mssql_connect() function. By exploiting this vulnerability, an attacker can overwrite the structured exception handler (SEH) and gain control over the affected system. The exploit targets Windows 2000 SP3 version. This exploit was developed by retrogod and can be found on their website at http://retrogod.altervista.org.

Mambo/Joomla Component New Article Component <= 1.1 (absolute_path) Multiple RFI

This vulnerability allows an attacker to include remote files by manipulating the 'absolute_path' parameter in the 'com_articles.php' and 'html/com_articles.php' files. By providing a malicious URL as the 'absolute_path' parameter, an attacker can execute arbitrary code on the server.

Pixaria Gallery 1.x (class.Smarty.php) Remote File Include Vulnerability

The Pixaria Gallery 1.x version is vulnerable to remote file inclusion. The vulnerability exists in the '/resources/includes/class.Smarty.php' file, where it loads the main Smarty class. An attacker can exploit this vulnerability by passing malicious code in the 'cfg[sys][base_path]' parameter, allowing them to include arbitrary files from a remote server.

ZTE ZXV10 W300 v3.1.0c_DR0 – UI Session Delete Vulnerability

A session vulnerability has been discovered in the official ZTE Corporation ZXV10 W300 v3.1.0c_DR0 modem hardware. The security vulnerability allows remote attackers to block/shutedown or delete network settings and components. Attackers can request via GET method the /Forms/home_lan_1 path and the modem will delete all the LAN configurations automatically.

Garennes 0.6.1 <= Remote File Include Vulnerabilities

The Garennes version 0.6.1 is vulnerable to Remote File Include. This vulnerability allows an attacker to include remote files by exploiting the 'repertoire_config' parameter in various PHP files. The attacker can specify a malicious file as the value of the 'repertoire_config' parameter, leading to arbitrary code execution.

RuubikCMS Multiple Vulnerabilities

Attackers can steal cookie-based authentication credentials, execute arbitrary script code in the browser, and retrieve arbitrary files from the affected system. This can lead to the disclosure of sensitive information and other possible attacks.

Recent Exploits: