header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WFTPD Pro Server 3.21 MLST DoS Exploit

This exploit targets the WFTPD Pro Server 3.21 and causes a Denial of Service (DoS) by sending a specially crafted MLST command. It fills the buffer with 'A's and sends the command repeatedly, increasing the size of the buffer each time. This exploit can crash the server and render it unavailable.

PhpHostBot <= 1.06 (svr_rootscript) Remote File Inclusion Vulnerability

Input passed to the "svr_rootscript" parameter in order/login.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled.

DNS Cache Poison v0.3beta

This is a Python script that performs DNS cache poisoning. It is based on the Amit Klein paper: http://www.trusteer.com/docs/bind9dns.html. The script predicts the next transaction ID for DNS queries and attempts to poison the cache with malicious responses. The output of the script includes the time, IP, port, ID, query, number of good predicted IDs, and number of errors.

CartWeaver SQL Injection Vulnerability

The CartWeaver application is vulnerable to SQL injection attacks in the Details.cfm page, specifically in the ProdID parameter. An attacker can manipulate the ProdID parameter to execute arbitrary SQL queries. This can lead to unauthorized access, disclosure of sensitive information, and potential compromise of the application and its data.

XSS persistent on intelbras router with firmware WRN 250

This exploit allows for persistent XSS on intelbras routers with firmware WRN 250. The vulnerability can be exploited by injecting a malicious script through the URL http://10.0.0.1/userRpm/popupSiteSurveyRpm.htm. The payload used in the exploit is </script><script src='//elb.me'>. This exploit requires the presence of a PHP script to retrieve the logs.

0day Live for speed patch x s2 /s1 and demo local .Spr File buffer over flow

The exploit takes advantage of a buffer overflow vulnerability in the .spr file format used in Live for Speed. By crafting a specially crafted .spr file, an attacker can overwrite the EIP register and execute arbitrary code. This vulnerability is different from the previously discovered buffer overflow in .mpr files. The .spr files are stored in a separate folder and have a different file structure. The exploit code provided can be compiled using Dev C++ 4.9.9.2. Use caution when handling .spr files as they can be used for malicious purposes.

0day Live for speed patch x s2 /s1 and demo local .ply File buffer over flow

The vulnerability occurs in Live for speed .ply file due to an overly long number plate string. By exploiting this issue, an attacker can execute malicious shell code by convincing a user to put the .ply file inside their misc folder inside of Lfs2. The buffer overflow occurs when filling the number plate field with over 1000 bytes of buffer.

MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION

Remote attackers who can lure a Mongoose web server user into clicking a malicious link or visit attacker controlled web page can execute system commands on the system hosting Mongoose server. However, IF Mongoose web server is installed as service then executing programs e.g. 'calc.exe' may at times crash or fail to appear, but you may see it in Windows taskmgr.exe. Therefore, from my tests commands may become unstable when Mongoose is run as a service. When Mongoose is run standard mode attackers can potentially modify 'Mongoose.conf' and create arbitrary files on server like .PHP etc. to point Mongoose to this as its new 'index' file. Then you need to tell Mongoose its 'access_log_file' is the new attacker generated file, after injecting commands into Mongoose web servers log file that will get executed when log file is later requested. This vulnerability requires CGI interpreter to be already set or some information about the target is known like the CGI path and language 'pl,php,cgi' used, so when we can set to use correct programming language when file is created during initial CRSF attack.

Recent Exploits: