header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LulieBlog 1.2 Multiple Remote Vulnerabilities (Admin Auth Bypass, Upload File, Blind SQL Injection)

The LulieBlog 1.2 version is vulnerable to multiple remote vulnerabilities including admin authentication bypass, file upload, and blind SQL injection. The admin authentication bypass vulnerability allows an attacker to modify articles, create new articles, change admin username and blog title, and change admin email. The file upload vulnerability allows an attacker to upload files to the server. The blind SQL injection vulnerability can be exploited using a Perl script.

Web Slider <= 0.6 Insecure Cookie/Authentication Handling

The Web Slider script version 0.6 and prior suffers from insecure cookie handling. When an admin logs in successfully, a cookie is created without containing any password or other authentication data. By creating a specific cookie, an attacker can impersonate an admin and gain unauthorized access to restricted areas.

Microsoft mssql 7.0 server denial of service vulnerability

By sending a large buffer with specified data, an attacker can stop the Microsoft mssql 7.0 server. The error noticed is different according to the services' pack, but the result is always the same. Exception Codes = c0000005. This code is for educational purposes and the author is not responsible for any acts performed using this exploit.

La-Nai CMS <= 1.2.16 (fckeditor) Arbitrary File Upload Exploit

The vulnerability exists in the /include/fckeditor/editor/filemanager/upload/php/upload.php file of La-Nai CMS version 1.2.16. The code allows an attacker to upload arbitrary files to the server. The file name and extension are obtained from the uploaded file, and the file type is checked against allowed types. However, the check can be bypassed by modifying the 'Type' parameter. This allows an attacker to upload any file, regardless of its extension or type. The uploaded file is saved in the target directory, which can be specified in the configuration file. This can lead to remote code execution or unauthorized access to sensitive information.

Serendipity Weblog SQL Injection

The Proof of Concept (PoC) demonstrates two SQL injection vulnerabilities in the Serendipity Weblog application. The first PoC script retrieves the username and MD5 hashed password of the first author from the 'serendipity_authors' table. The second PoC is a URL that can be used in the browser to retrieve the username and password of the first author from the 'serendipity_authors' table.

ClanLite V2 SQL Injection & XSS

The ClanLite V2 script is vulnerable to SQL injection and XSS attacks. The SQL injection vulnerability can be exploited by an attacker to extract sensitive information from the database. The XSS vulnerability allows an attacker to inject and execute malicious scripts on the affected website.

Buffer Overflow in Zinf audio player

This exploit targets a buffer overflow vulnerability in the Windows version of Zinf audio player. The vulnerability is present in version 2.2.1 and allows for remote code execution via a malicious .pls playlist file. The exploit generates a file called exploit.pls, which overflows a structured exception handler (SEH) and jumps to a service pack independent address to download and execute a file.

Recent Exploits: