header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebED v0.0.9 (index.php) Remote File Disclosure Vulnerabilities

The vulnerability exists in the index.php file of WebED v0.0.9. The code in the file allows an attacker to read arbitrary files on the server by manipulating the 'Root' and 'Path' parameters in the URL. By including '../' in the parameters, an attacker can navigate to sensitive files such as '/etc/passwd'. This vulnerability can be exploited remotely.

Veeam ONE Reporter – Cross-Site Request Forgery (All Actions/Methods)

This exploit allows an attacker to perform various actions/methods on the Veeam ONE Reporter application. The exploit uses a form submission with a crafted payload to execute the desired action, such as deleting a dashboard. All methods in the application are vulnerable to this exploit.

Free Float FTP 1.0 “SIZE” Remote Buffer Overflow

This exploit targets a remote buffer overflow vulnerability in Free Float FTP 1.0. By sending a specially crafted "SIZE" command, an attacker can trigger a buffer overflow and potentially execute arbitrary code on the target system.

Web-MeetMe 3.0.3 Remote File Disclosure Vulnerability

The Web-MeetMe 3.0.3 application is vulnerable to a remote file disclosure vulnerability. By exploiting this vulnerability, an attacker can disclose sensitive files on the server by including malicious input in the 'roomNo' or 'bookid' parameters of the 'play.php' script. This can allow an attacker to view the contents of files such as the '/etc/passwd' file. The vulnerability was discovered by Evil.Man.

Lavavo CD Ripper 4.20 Local Seh Exploit

This exploit targets a local SEH (Structured Exception Handling) overflow vulnerability in Lavavo CD Ripper version 4.20. By providing a specially crafted 'License Activation Name' value, an attacker can trigger a buffer overflow and execute arbitrary code. This exploit creates a bind shell on port 3110.

NoAh <= 0.9 pre 1.2 (filepath) Remote File Disclosure Vulnerabilities

The NoAh version 0.9 pre 1.2 is vulnerable to remote file disclosure. This vulnerability allows an attacker to disclose sensitive files on the system by exploiting certain files in the NoAh system module templates. By manipulating the 'filepath' parameter in the URLs, an attacker can access files outside the intended directory and retrieve sensitive information such as the '/etc/passwd' file.

V8 FixedDoubleArray Length Overflow Vulnerability

This vulnerability exists in the V8 JavaScript engine in the way it handles the length of FixedDoubleArray. By providing a large length value to the NewFixedDoubleArray function, an attacker can trigger an integer overflow and potentially cause a denial of service or remote code execution.

Recent Exploits: