header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

QuickTime RTSP Response Content-type remote stack rewrite exploit for IE 6/7

This exploit targets a vulnerability in QuickTime that allows remote attackers to rewrite the stack and execute arbitrary code on systems running Internet Explorer 6 or 7. It involves sending a specially crafted RTSP response with a manipulated Content-type header. The exploit has been tested on Windows Vista and Windows XP SP2 with IE 6.0/7.0 and QuickTime 7.2/7.3.

AIDA64 Extreme 5.99.4900 – SEH Buffer Overflow (EggHunter)

The program AIDA64 Extreme 5.99.4900 has a SEH Buffer Overflow vulnerability. This code demonstrates one of the instances of the vulnerability. The vulnerability exists in several places within the program. To optimize the code, a stack pivot technique is used, which is the same in Extreme, Engineer, and Network Audit editions of version 5.99.4900. The vulnerability also exists in older versions of the program available on sites like soft32.com or in the AIDA64 downloads archive.

Unauthenticated SQL Injection on CMS Made Simple <= 2.2.9

This exploit allows an attacker to perform unauthenticated SQL injection on CMS Made Simple version 2.2.9 or earlier. The vulnerability can be exploited by sending a specially crafted request to the 'moduleinterface.php' file. If exploited successfully, an attacker can gain unauthorized access to the database and potentially extract sensitive information. This vulnerability has been assigned CVE-2019-9053.

JioFi 4G M2S 1.0.2 CSRF Vulnerability

The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. The issue is triggered when an unauthorized input passed via multiple POST and GET parameters are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

cgi-bin/webscr?cmd=_cart in the WooCommerce PayPal Checkout Payment Gateway plugin 1.6.8 for WordPress allows Parameter Tampering in an amount parameter (such as amount_1), as demonstrated by purchasing an item for lower than the intended price

The Web Parameter Tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc. Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack can be performed by a malicious user who wants to exploit the application for their own benefit, or an attacker who wishes to attack a third-person using a Man-in-the-middle attack. In both cases, tools likes Webscarab and Paros proxy are mostly used.

CMS Made Simple (CMSMS) Showtime2 File Upload RCE

This module exploits a File Upload vulnerability that lead in a RCE in Showtime2 module (<= 3.6.2) in CMS Made Simple (CMSMS). An authenticated user with 'Use Showtime2' privilege could exploit the vulnerability. The vulnerability exists in the Showtime2 module, where the class 'class.showtime2_image.php' does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG). Tested on Showtime2 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2 on CMS Made Simple (CMSMS) 2.2.9.1

Recent Exploits: