header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mobilelib Gold v3 (Auth Bypass/SQL) Multiple Remote Vulnerabilities

The 'auth.php' file in Mobilelib Gold v3 allows an attacker to bypass authentication and perform SQL injection. The 'adminName' parameter is not properly sanitized before being used in a SQL query, allowing an attacker to inject arbitrary SQL code. A successful exploit can result in unauthorized access to the application's database.

SAP Business One 2005-A License Manager Remote Overflow PoC

NT_Naming_Service.exe (License Manager 2005 for SAP Business One 2005-A) is vulnerable to a stack-based buffer overflow allowing for full system compromise by an unauthenticated user that has TCP/IP access to SAP's license service on TCP port 30000.

VLC Media Player 0.8.6f smb:// URI Handling Remote BOF Exploit (univ)

This exploit takes advantage of a buffer overflow vulnerability in VLC Media Player 0.8.6f. It allows an attacker to execute arbitrary code remotely by sending a specially crafted smb:// URI. The vulnerability was discovered by Pankaj Kohli and the exploit was developed by His0k4.

rp9-priv-esc.c

A local privilege escalation attack against the community supported version of Real.com's Realplayer, version 9. By default, configuration files are stored in ~$USER/.realnetworks/ and are group writeable. A malicious local user can edit the config files of fellow users to perform unauthorized actions. The attack involves modifying the path to shared libraries and writing malicious shared libraries.

Winmod 1.4 (.lst) Local Stack Overflow Exploit (RET overwrite+SEH)

This exploit targets the Winmod 1.4 (.lst) software on Windows XP SP3. It utilizes a stack overflow vulnerability to execute arbitrary code. The exploit overwrites the return address (RET) and structured exception handler (SEH) to gain control of the program. It then injects shellcode to execute a calculator application. The shellcode used in this exploit is based on the Metasploit framework.

Responsive E-Learning System 1.0 Β– Stored Cross Site Scripting

A stored cross-site scripting vulnerability exists in the Responsive E-Learning System 1.0, which allows an attacker to inject malicious JavaScript code into the application. By exploiting this vulnerability, an attacker can gain access to the application and execute malicious code on the victim's browser.

Recent Exploits: