header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GeoGebra CAS Calculator 6.0.631.0 – Denial of Service (PoC)

The GeoGebra CAS Calculator version 6.0.631.0 is vulnerable to a Denial of Service (DoS) attack. By providing a specially crafted payload.txt file as input, an attacker can cause the program to crash, resulting in a denial of service condition.

GeoGebra Classic 5.0.631.0-d – Denial of Service (PoC)

The GeoGebra Classic version 5.0.631.0-d is vulnerable to a denial of service (DoS) attack. By running a specially crafted Python script, an attacker can create a payload.txt file with a large amount of data, causing the GeoGebra program to crash when the content of the file is pasted in the 'Entrada' field.

GeoGebra Graphing Calculato?r? 6.0.631.0 – Denial Of Service (PoC)

The GeoGebra Graphing Calculator version 6.0.631.0 is vulnerable to a denial of service attack. By providing a specially crafted input in the 'Entrada...' field, an attacker can cause the application to crash, resulting in a denial of service condition.

NuCom 11N Wireless Router 5.07.90 – Remote Privilege Escalation

The non-privileged default user can elevate his/her privileges by sending a HTTP GET request to the configuration backup endpoint and disclose the http super password (admin credentials) in Base64 encoded value. Once authenticated as admin, an attacker will be granted access to the additional and privileged pages.

Golden FTP Server 4.70 – ‘PASS’ Buffer Overflow (2)

A buffer overflow exists in GoldenFTP during the authentication process. Note that the source ip address of the user performing the authentication forms part of the buffer and as such must be accounted for when calculating the appropriate offset. It should also be noted that the exploit is rather unstable and if exploitation fails, GoldenFTP will be left in a state where it will still accept connections, but it will be unable to handle or process them in anyway, so be careful.

GLPI 9.5.3 – ‘fromtype’ Unsafe Reflection

Non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors.

Joomla JCK Editor 6.4.4 – ‘parent’ SQL Injection (2)

The Joomla JCK Editor version 6.4.4 is vulnerable to SQL Injection. The vulnerability allows an attacker to inject malicious SQL statements into the 'parent' parameter in the 'links.php' file. By exploiting this vulnerability, an attacker can retrieve sensitive information from the database or modify the database contents.

Recent Exploits: