header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Airsensor M520 HTTPD Remote Preauth Denial Of Service and Buffer Overflow PoC

The vulnerability is caused due to an unspecified error in the cgis files filter used for configure properties. This can be exploited by sending a specially crafted HTTPS request (necessary authentication), which will cause the HTTPS service on the system to crash.

Bravo Tejari Web Portal-CSRF

The Web Interface of the Bravo Tejari procurement portal does not use random tokens to block any kind of forged requests. An attacker can take advantage of this scenario and create a forged request to edit user account details like name, address of the company/individual, email address etc. He then uses social engineering techniques to target specific individuals whose account details he would like to change. He simply sends the link and tricks the user into clicking the forged http request. The request is executed and user account details are changed without his knowledge.

Denial of Service in Softros Network Time System Server v2.3.4

Network Time System (Server) "NTSServerSvc" service listens on Port 7001, unauthenticated remote attackers can crash the Server by sending exactly 11 bytes to the target system. Systems which may depend on critical time synchronization could then potentially be impacted.

Ktauber.com StylesDemo Mod for phpbb 2.0.xx Multiple Vulnerabilities

This exploit allows an attacker to perform XSS and SQL injection attacks on the Ktauber.com StylesDemo Mod for phpbb 2.0.xx. The exploit uses LWP::UserAgent and HTTP::Request::Common modules to send HTTP requests and retrieve responses. The vulnerable site is specified in the configuration as http://www.forumup.com/stylesdemo/

Dup Scout Enterprise 10.5.12 – Local Buffer Overflow

This exploit is a local buffer overflow in Dup Scout Enterprise version 10.5.12. By generating a specific file and copying its contents to the clipboard, an attacker can execute arbitrary code and potentially gain control of the affected system. The exploit has been tested on Windows 7 x86.

Xion 1.0.125 (.m3u File) Local SEH-based Unicode The “Venetian” Exploit

The exploit allows for the execution of arbitrary code by exploiting a buffer overflow vulnerability in Xion 1.0.125 when processing a .m3u file. The exploit leverages a SEH-based Unicode technique to corrupt memory and execute malicious code. The vulnerability is caused by a lack of proper input validation, allowing an attacker to overwrite the SEH frame and gain control of the program's execution flow. This can lead to remote code execution or a denial of service.

Recent Exploits: