header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MacOS multiple kernel UAFs due to incorrect IOKit object lifetime management in IOTimeSyncClockManagerUserClient

IOTimeSyncClockManagerUserClient overrides the IOUserClient::clientClose method but treats it like a destructor, leading to multiple use-after-free vulnerabilities. Calling ::clientClose in one thread and an external method in another thread can cause the OSArrays to be freed and the locks protecting them to be destroyed, resulting in UaFs if the arrays are manipulated in other threads.

Blind SQL Injection in DL PayCart 1.01

This exploit allows an attacker to perform blind SQL injection in DL PayCart 1.01. The vulnerability was discovered by irvian in 2007. The exploit sends malicious requests to the target website, exploiting a vulnerability in the viewitem.php file. By manipulating the 'ItemID' parameter, the attacker can extract information from the pc_settings table, specifically the 'AdminID' and 'AdminPass' fields. The exploit uses a blind technique to infer the values of these fields character by character. The exploit prints the extracted values to the console.

Micro CMS 3.5 SQL Injection

The Micro CMS 3.5 application is vulnerable to SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'id' parameter in the 'revert-content.php' file. This allows the attacker to bypass authentication and retrieve sensitive information from the database. The specific exploit for this vulnerability is: 'http://site.com/[micro_cms]/cms/revert-content.php?type=newest&id=1%22%20UNION%20ALL%20SELECT%20null,null,SUBSTRING(administrators_pass,1,16),null,null%20FROM%20microcms_administrators/*'.

Postcast Server Pro 3.0.61 / Quiksoft EasyMail SMTP Object Remote Buffer Overflow Exploit

The exploit allows an attacker to pass more than 539 characters to the SubmitToExpress method in Postcast Server Pro 3.0.61 / Quiksoft EasyMail SMTP Object (emsmtp.dll 6.0.1). This results in a buffer overflow vulnerability, leading to a remote code execution.

Recent Exploits: