header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NUUO Local File Disclosure Vulnerability

NUUO NVRmini, NVRmini2, Crystal and NVRSolo suffers from a file disclosure vulnerability when input passed thru the 'css' parameter to 'css_parser.php' script is not properly verified before being used to include files. This can be exploited to disclose contents of files from local resources.

Zenturi ProgramChecker ActiveX (sasatl.dll) Remote Buffer Overflow PoC

This is a proof-of-concept (PoC) exploit for a remote buffer overflow vulnerability in the Zenturi ProgramChecker ActiveX control (sasatl.dll). The exploit takes advantage of a buffer overflow vulnerability to execute arbitrary code on the target system. It has been tested on Windows XP Professional SP2 with Internet Explorer 7.

RevokeBB <= 1.0 RC4 Blind SQL Injection / Hash Retrieve Exploit

This exploit allows an attacker to perform a blind SQL injection and retrieve the hash from the RevokeBB <= 1.0 RC4 application. The attacker needs to provide the target server's IP/hostname, path of the RevokeBB application, a valid username, and the table prefix as input parameters. The exploit then sends a crafted packet to the target server and retrieves the hash.

Particle Gallery SQL Injection Exploit

This is a SQL Injection exploit for Particle Gallery version 1.0.1. The vulnerable code is in the viewimage.php file. The code uses the dbSecure() function from functions.php for SQL input validation, but it is not necessary in this case as the input does not require any quotes. The exploit allows an attacker to edit comments in the gallery.

Easy File Sharing Web Server 7.2 SEH Overflow with Egghunter

This exploit targets Easy File Sharing Web Server version 7.2 and leverages a SEH overflow vulnerability to execute arbitrary code. It also uses an egghunter technique to locate the payload in memory. The vulnerability allows an attacker to gain admin privileges on the targeted system. The exploit has been tested on Windows 7, 8, 8.1, and 10.

NTLM && BASIC AUTH BYPASS

This script allows an attacker to bypass NTLM and Basic Authentication. It takes a website and a protected object as input parameters. It then constructs a malicious URL and uses the Lynx browser to access it. The URL contains parameters that bypass the authentication and access the protected object. The script is based on the vulnerability described in CVE-2007-2815.

Recent Exploits: