header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

River Past Cam Do 3.7.6 Local Buffer Overflow in Activation Code

This exploit takes advantage of a buffer overflow vulnerability in the activation code of River Past Cam Do 3.7.6. By generating a malicious activation code and pasting it into the application, an attacker can execute arbitrary code, such as launching the calculator (calc.exe) in this example.

PHP-Nuke NSN Script Depository module <= 1.0.0 Remote Source Disclosure

This exploit allows an attacker to remotely disclose the source code of a PHP-Nuke NSN Script Depository module version 1.0.0 or below. By providing the target URL and the file path, the exploit generates a form that triggers the disclosure of the specified file.

Reflected HTML Injection

This vulnerability allows an attacker to inject HTML code into a website, which can lead to various attacks such as cross-site scripting (XSS). The vulnerability can be exploited by manipulating the 'log', 'name', or 'data' parameters in the affected URLs. An example payload for this exploit is '<h1>HTML Injection</h1>'.

Serialization Vulnerability in Blink

The AddOriginals function in initialize_v8_extras_binding.cc in Blink does not properly handle serialization when Transferable Streams are enabled, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML page. The vulnerability exists in the serialization process for MessagePort and DOMException objects.

Eurologon CMS reviews.php/links.php/articles.php SQL Injection

The Eurologon CMS is vulnerable to SQL Injection. Attackers can exploit this vulnerability by injecting malicious SQL queries into the 'id' parameter of the reviews.php, links.php, and articles.php pages. This allows them to retrieve sensitive information from the database, such as usernames and passwords.

TeemIp IPAM < 2.4.0 - 'new_config' Command Injection

This module exploits a command injection vulnerability in TeemIp versions prior to 2.4.0. The 'new_config' parameter of 'exec.php' allows you to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server. The vulnerability can be exploited by an authorized user (Administrator). Module allows remote command execution by sending php payload with parameter 'new_config'.

Recent Exploits: