header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

EQdkp <= 1.3.2 SQL Injection Exploit

This exploit allows an attacker to retrieve the admin username and hash from the EQdkp <= 1.3.2 application. The vulnerability exists in the listmembers.php file, where user input is not properly sanitized before being used in an SQL query. By injecting malicious SQL code through the 'rank' parameter in the URL, an attacker can retrieve sensitive information from the database.

Sendcard <= 3.4.1 Remote Code Execution Exploit

This is an exploit for Sendcard version 3.4.1 that allows remote code execution. It takes advantage of a vulnerability in the software to execute arbitrary commands on the target server. The exploit requires the hostname or IP address of the target server, the path where Sendcard is located, and the command to execute. It can be used to list files on the server or read the contents of specific files.

MS08-067 Exploit

This is a modified version of Debasis Mohanty's code. The return addresses and the ROP parts are ported from metasploit module exploit/windows/smb/ms08_067_netapi. The exploit utilizes a reverse TCP shellcode from metasploit with a payload size of 380 bytes. The shellcode is used to execute arbitrary code on a vulnerable system. The exploit takes advantage of a vulnerability in the SMB service on Windows systems to achieve remote code execution.

Recent Exploits: