header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vtiger CRM 7.1.0 – Remote Code Execution

This application has the vulnerability of uploading files with the extension 'php3' in the logo upload field. But the uploaded file must be in PNG format and size 150X40. We can put PHP code into image source. After you make the extension 'php3', the PHP code that we've placed can work. Therefore, PHP code can be executed using '<? ?>' Tags in PNG format file. I have exploited in 2 different ways. First one uploads a basic php shell for you and lets you control it through the console. Second one uploads the php meterpreter payload to the target site and lets you set this payload.

ShareAlarmPro 2.1.4 – Denial of Service (PoC)

This exploit creates a file with a large payload, causing the ShareAlarmPro software to crash when attempting to open it. It is a proof-of-concept exploit that demonstrates the vulnerability in the software. The vulnerability allows an attacker to cause a denial of service condition by sending a specially crafted payload to the software.

MAGIX Music Editor 3.1 – Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in MAGIX Music Editor 3.1. By providing a specially crafted input, an attacker can overflow a buffer and overwrite the Structured Exception Handler (SEH) to gain control of the program flow. This allows the attacker to execute arbitrary code, such as launching a calculator application.

Recent Exploits: