header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

YNP Portal System 2.2.0 Remote File Disclosure Vulnerability

The YNP Portal System version 2.2.0 is vulnerable to remote file disclosure. This allows an attacker to access sensitive files on the server by exploiting the 'showpage.cgi' script. By manipulating the 'p' parameter in the URL, an attacker can disclose files outside the web root directory, such as the '/etc/passwd' file.

Malicious Git HTTP Server For CVE-2017-1000117

This module exploits CVE-2017-1000117, which affects Git version 2.7.5 and lower. A submodule of the form 'ssh://' can be passed parameters from the username incorrectly. This can be used to inject commands to the operating system when the submodule is cloned. This module creates a fake git repository which contains a submodule containing the vulnerability. The vulnerability is triggered when the submodules are initialised.

( Microsoft Visual 6 ) VDT70.DLL Stack Overflow Exploit

This exploit targets the VDT70.DLL component in Microsoft Visual Database Tools Database Designer V7.0. It takes advantage of a stack overflow vulnerability to execute arbitrary code. The exploit was discovered by D_7J and developed by the DeltahackingSecurityTEAM. It has been tested on Windows XP Professional SP2 with Internet Explorer 6.

Easy Vedio to PSP Converter 1.6.20 – Local Buffer Overflow (SEH)

The exploit takes advantage of a buffer overflow vulnerability in Easy Vedio to PSP Converter version 1.6.20. By pasting a specially crafted content into the 'Enter User Name' field, an attacker can trigger the overflow and gain control of the program's execution flow.

la-nai cms_v1.2.14 – Remote SQL Injection

The la-nai cms_v1.2.14 module is vulnerable to remote SQL injection. The authentication login on the site's front page can be bypassed by using a username from the la-nai tbl_ln_user database. This can be achieved by providing '/* contoh admin'/* <-- magic_quotes_gpc = off

Panda Antivirus 2008 Local Privilege Escalation

During installation of Panda Antivirus 2008, the permissions for the installation folder are set to Everyone:Full Control, allowing an unprivileged user to replace the service executable with a file of their choice and gain full access with LocalSystem privileges. This can be exploited by renaming the service executable, copying a trojaned application, and rebooting the system.

Easy RM RMVB to DVD Burner 1.8.11 – ‘Enter User Name’ Field Buffer Overflow (SEH)

Buffer overflow vulnerability in Easy RM RMVB to DVD Burner 1.8.11 allows remote attackers to execute arbitrary code via a long string in the 'Enter User Name' field. This can be exploited to execute arbitrary code with the privileges of the user running the application.

Recent Exploits: