header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Project64 2.3.2 – Local BufferOverflow (SEH)

This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in Project64 version 2.3.2. By creating a specially crafted file and manipulating the 'Plugin Directory' field, an attacker can trigger a buffer overflow and gain control over the program's execution flow.

WordPress Plugin Ninja Forms 3.3.13 – CSV Injection

WordPress Ninja Forms plugin version 3.3.13 and before are affected by Remote Code Execution through the CSV injection vulnerability. This allows an application user to inject commands as part of the fields of forms and these commands are executed when a user with greater privilege exports the data in CSV and opens that file on his machine.

Hikvision IP Camera 5.4.0 – User Enumeration (Metasploit)

Many Hikvision IP cameras contain a backdoor that allows unauthenticated impersonation of any configured user account. The vulnerability has been present in Hikvision products since at least 2014. In addition to Hikvision-branded devices, it affects many white-labeled camera products sold under a variety of brand names. Hundreds of thousands of vulnerable devices are still exposed to the Internet at the time of publishing. In addition to gaining full administrative access, the vulnerability can be used to retrieve plain-text passwords for all configured users.

Twitter-Clone 1 – ‘userid’ SQL Injection

The Twitter-Clone 1 application is vulnerable to SQL Injection in the 'userid' parameter in the 'follow.php' and 'index.php' files. An attacker can exploit this vulnerability to execute arbitrary SQL queries and potentially gain unauthorized access to the database.

KwsPHP ver 1.0 Newsletter Module

This exploit allows remote attackers to inject SQL queries and retrieve sensitive information from the database. The vulnerability exists in the newsletter module of KwsPHP version 1.0. The exploit takes advantage of the magic_quotes_gpc setting being turned off. By manipulating the 'newsletter' parameter in the index.php file, an attacker can execute arbitrary SQL queries and retrieve data from the 'users' table. The extracted data includes the username and password of the admin user with ID 1. The exploit also demonstrates the ability to inject malicious code and save it as a file on the server.

Recent Exploits: