header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Xitami Web Server 2.5 Remote Buffer Overflow (SEH + Egghunter)

This exploit targets Xitami Web Server version 2.5b4. By sending a specially crafted payload, an attacker can trigger a remote buffer overflow in the server, allowing them to execute arbitrary code on the target system. The exploit utilizes SEH (Structured Exception Handling) and an egghunter to locate the payload in memory.

Buffer Overflow Vulnerability in Dameware Mini Remote Control

The DWRCC executable file in Dameware Mini Remote Control version 10.0 x64 is affected by a buffer overflow vulnerability. The buffer size passed in the machine name parameter is not checked, allowing an attacker to pass a buffer to the machine host name parameter.

Windows PowerShell ISE Filename Parsing Flaw Remote Code Execution

Windows PowerShell ISE will execute wrongly supplied code when debugging specially crafted PowerShell scripts that contain array brackets as part of the filename. This can result in ISE executing attacker supplied scripts pointed to by the filename and not the "trusted" PS file currently loaded and being viewed by a user in the host application. This undermines the integrity of PowerShell ISE allowing potential unexpected remote code execution.

Oracle Weblogic Exploit CVE-2019-2725

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.

Seditio CMS <= 121 Remote SQL Injection Exploit

This exploit allows an attacker to perform remote SQL injection on Seditio CMS version 121 or below. The vulnerability can be exploited if the target server meets the requirements of MySQL version 4.1 or above with magic_quotes_gpc set to Off. The exploit retrieves the user's hash and cookie to log in as the user.

Fleet Manager hyvikk Shell Upload

You can upload a php shell file as a vehicle image. After uploading the image, the shell will be saved in the /uploads/ folder with the id code. You can access the shell by going to http://localhost/delivery/public/vehicles/ and right-clicking on the recent 'php shell photo' you have uploaded.

Recent Exploits: