header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer overflow in NetTransport Download Manager – Version 2.96L (DEP Bypass)

A buffer overflow vulnerability in NetTransport.exe in NetTransport Download Manager 2.96L and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long HTTP response. To exploit this vulnerability, an attacker needs to issue a malicious-crafted payload in the HTTP Response Header. A successful attack could result in code execution.

Telesquare SKT LTE Router SDT-CS3B1 Insecure Direct Object Reference Info Leak

This vulnerability allows attackers to bypass authorization and access resources and functionalities in the system by providing direct access to objects based on user-supplied input.

phpBG 0.9.1 (rootdir) Remote File Inclusion Vulnerability

The phpBG 0.9.1 application is vulnerable to remote file inclusion. The vulnerability allows an attacker to include arbitrary files from the server using the 'rootdir' parameter in various PHP scripts. This can lead to remote code execution and compromise the server.

Exploit Web Interface

This exploit targets the web interface of servers with Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), or Intel Small Business Technology (SBT) installed. It checks if the server is vulnerable by making a request to the index.htm page and checking the server header. If the server is vulnerable, it returns True.

StringBleed – CVE-2017-5135

The StringBleed exploit is a vulnerability in the SNMPv1 protocol that allows an attacker to read arbitrary memory from a target system. The exploit generates a SNMP request with a specific community string and OID, which triggers the vulnerability and allows the attacker to read sensitive information from the target system's memory.

ABC estore 3.0 (cat_id) Blind SQL Injection

A blind SQL injection vulnerability exists in ABC estore 3.0. By injecting SQL code in the (cat_id) parameter of the index.php script, an attacker can manipulate the database and retrieve sensitive information such as usernames and passwords. This vulnerability requires the presence of subcategories for successful exploitation.

Recent Exploits: