header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

(MS05-002) Microsoft Internet Explorer .ANI Files Handling Exploit

A remote code execution vulnerability exists in the way that cursor, animated cursor, and icon formats are handled. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially allow remote code execution if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

local/remote file accessibility exploit

This exploit allows for accessing remote files in a specified directory. There are no limitations on file accessing other than it must be a filename/path equal to 10 or fewer bytes. This limits the remote possibilities somewhat, but symlinking to a short path locally can access anything. This exploit works locally.

Flexphplink Pro SQL Injection Vulnerability

The vulnerability exists in the usercheck.php file of the Flexphplink Pro CMS. It allows an attacker to execute arbitrary SQL queries by manipulating the 'username' and 'password' parameters. By providing the SQL code ' or '1=1, an attacker can bypass authentication and gain unauthorized access to the system.

Flexphpsiteen CMS SQL Injection Vulnerability

The vulnerability exists in the usercheck.php file of the Flexphpsiteen CMS. By manipulating the 'username' and 'password' parameters, an attacker can inject malicious SQL code and bypass authentication. The provided exploit code demonstrates the use of a common SQL injection technique by using the payload ' or '1=1' to always evaluate to true, granting unauthorized access to the admin panel.

Recent Exploits: