header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ADULT FILTER 1.0 – Denial of Service (PoC)

This exploit script creates a file with a specific content that triggers a crash in the ADULT FILTER 1.0 software. By adding the content of the file to the 'Black Domain List' in the program's options, it causes the program to crash.

Windows SetImeInfoEx Win32k NULL Pointer Dereference

This module exploits elevation of privilege vulnerability that exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Oracle Siebel CRM 8.1.1 – CSV Injection

Siebel CRM application was found to be vulnerable to Excel Macro injection vulnerability, in places where user input is allowed (in text form) and the input can then be exported in CSV form. An attacker can change user information to include in his input a malicious excel function. The function will then be executed on the victim’s machine, once the victim exports the details in CSV format and opens the exported file in Microsoft Excel.

Oracle 10g CTX_DOC.MARKUP SQL Injection Exploit

This exploit allows an attacker to grant DBA privileges to an unprivileged user in Oracle 10g by exploiting the CTX_DOC.MARKUP function. The exploit involves creating a function called HACKIT that executes a dynamic SQL statement to grant the DBA role to the user 'scott'. The function is then called, granting the DBA role to the user. This vulnerability was reported by David Litchfield in June 2005 and was publicly disclosed on October 17, 2007. This exploit has been tested on Oracle 10.1.0.2.0.

Time and Expense Management System 3.0 – Cross-Site Request Forgery (Add Admin)

This exploit allows an attacker to add, edit, and delete admin and all users in the Time and Expense Management System 3.0. By sending a specially crafted HTTP request to the target server, the attacker can update the admin user's information and gain administrative privileges. This vulnerability does not have a CVE assigned to it.

Recent Exploits: