header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebAlbum <= 2.02pl Remote Command Execution

This exploit allows an attacker to execute arbitrary shell commands on the target server by exploiting a vulnerability in the WebAlbum <= 2.02pl software. The vulnerability occurs due to the lack of sanitization of user input in the 'skin2' cookie parameter. By injecting malicious shell commands into the cookie, an attacker can execute arbitrary commands on the target server. This exploit works when the 'magic_quotes_gpc' setting is turned off. The exploit requires the attacker to have knowledge of the target server's IP/hostname, the path to the WebAlbum installation, and a shell command to execute. Various options are available for specifying a different port or using a proxy.

WM Downloader 3.1.2.2 2010.04.15 (.m3u) Buffer Overflow + DEP Bypass

Buffer overflow vulnerability in WM Downloader 3.1.2.2 allows remote attackers to execute arbitrary code via a long string in an .m3u file, triggering a stack-based buffer overflow, and bypassing DEP protections.

XHP CMS <= 0.5 remote command execution

This exploit allows an attacker to execute arbitrary commands on a target server running XHP CMS version 0.5 or lower. The attacker can upload a PHP file using the FileManager plugin and then execute commands through it. The vulnerability exists in the FileManager plugin's manager.php and standalonemanager.php files.

Inetserv 3.23 POP3 DoS

This script exploits a Denial of Service vulnerability in Inetserv version 3.23. By sending a specially crafted buffer in the RETR or DELE command, an attacker can cause the server to crash or become unresponsive. The vulnerability allows an unauthenticated attacker to disrupt the normal operation of the POP3 service.

GoldenFTP 4.70 PASS Exploit

This exploit targets GoldenFTP version 4.70 and allows an attacker to gain unauthorized access to the server. By sending a specially crafted password (PASS command), an attacker can trigger a buffer overflow vulnerability, potentially leading to remote code execution. The exploit requires knowledge of the server's subnet and certain settings to be enabled. It has been tested on Windows XP SP3.

Panda Global Protection 2010 Local Privilege Escalation Vulnerability

APPFLT.sys driver in Panda Global Protection 2010 (3.01.00) does not properly check inputs integers of an IOCTL, allowing for a local privilege escalation. Although the provided exploit is not functional, it can be modified to achieve privilege escalation.

Panda Global Protection 2010 (3.01.00) Integer Overflow Vulnerability

kl1.sys driver in Panda Global Protection 2010 (3.01.00) does not check inputs integer of an IOCTL, allowing an exception to be thrown if one DWORD is modified. This can lead to a BSOD (Blue Screen of Death).

bomberclone < 0.11.6.2 remote exploit

This exploit targets a vulnerability in bomberclone version 0.11.6.2. It allows an attacker to execute arbitrary code on the target system. The exploit code includes shellcode for both Linux and Windows systems. The Linux shellcode performs a bind shell on port 31337, while the Windows shellcode binds to port 4444. The exploit code is written in C.

Recent Exploits: