header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Billing Management System 2.0 – Union based SQL injection (Authenticated)

This web application contains several SQL injection vulnerabilities in the following paths: http://localhost/editgroup.php?id=1, http://localhost/edituser.php?id=1, http://localhost/editcategory.php?id=10, http://localhost/editproduct.php?id=1, http://localhost/editsales.php?id=1. The vulnerable code is in the editgroup.php file where the 'id' parameter is not properly sanitized before being used in a SQL query.

Microsoft Internet Explorer 8 – ‘SetMouseCapture’ Use After Free

This exploit targets the 'SetMouseCapture' function in Microsoft Internet Explorer 8. By triggering a use after free vulnerability (CVE-2013-3893), an attacker can execute arbitrary code on a vulnerable system. The exploit bypasses DEP and ASLR using the MSVCR71.DLL library. The PoC for this exploit can be found at the given GitHub link.

Persits XUpload 3.0 AddFile() Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in the AddFile() function of Persits XUpload 3.0. It allows an attacker to execute arbitrary code on the target system. The vulnerability was discovered by David Kierznowski and the exploit was written by e.b. The exploit has been tested on Windows XP SP2 (fully patched) with English language, IE6, and xupload.ocx version 3.0.0.4.

Microweber CMS 1.1.20 – Remote Code Execution (Authenticated)

This exploit allows an authenticated attacker to execute arbitrary code on the target system. The vulnerability exists in Microweber CMS version 1.1.20 and earlier. By exploiting this vulnerability, an attacker can upload a malicious payload and execute it on the target system. The exploit script provided in the example usage section demonstrates how to exploit this vulnerability.

Epic Games Rocket League 1.95 – Stack Buffer Overrun

The game suffers from a stack-based buffer overflow vulnerability. The issue is caused due to a boundary error in the processing of a UPK format file, which can be exploited to cause a stack buffer overflow when a user crafts the file with a large array of bytes inserted in the vicinity offset after the magic header. Successful exploitation could allow execution of arbitrary code on the affected machine.

Anote 1.0 – Persistent Cross-Site Scripting

The software allows you to store payloads within its own editor, as well as upload (.md) files once malicious code is entered, the payload will be executed immediately. The attacker can send a malicious file with the payload, when this file is opened, the chain will be executed successfully giving access to the remote attacker to get remote execution on the computer.

GetSimple CMS Custom JS 0.1 – CSRF to XSS to RCE

The Custom JS v0.1 plugin for GetSimple CMS suffers from a Cross-Site Request Forgery (CSRF) attack that allows remote unauthenticated attackers to inject arbitrary client-side code into authenticated administrators browsers, which results in Remote Code Execution (RCE) on the hosting server, when an authenticated administrator visits a malicious third party website.

Moodle 3.6.1 – Persistent Cross-Site Scripting (XSS)

The exploit allows for privilege escalation from student to administrator by exploiting a persistent cross-site scripting (XSS) vulnerability (CVE-2019-3810) in Moodle version 3.6.1. The exploit involves uploading an XSS payload and manipulating the first name and surname fields to execute malicious code. If successful, the attacker's account will be added as an administrator.

Recent Exploits: