header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VUPlayer <=2.49 .M3u Universal buffer overflow exploit w/ DEP bypass

This exploit takes advantage of a buffer overflow vulnerability in VUPlayer version 2.49 and earlier. The exploit allows an attacker to execute arbitrary code with the permissions of the user running the vulnerable software. The exploit includes a shellcode payload that opens the Windows calculator application (calc.exe).

Joomla Component com_searchlog SQL Injection

The Joomla component com_searchlog is vulnerable to SQL Injection. The vulnerability is located in the 'log.php' file at line 30. An attacker can exploit this vulnerability by manipulating the 'search' parameter in a POST request. By injecting malicious SQL code, an attacker can manipulate the database and potentially gain unauthorized access or retrieve sensitive information.

Joomla Component com_djartgallery Multiple Vulnerabilities

The Joomla component com_djartgallery has multiple vulnerabilities including Cross Site Scripting (XSS) and Blind SQL Injection. The XSS vulnerability can be exploited by injecting code into the 'id' parameter in the editimage function. The Blind SQL Injection vulnerability can be exploited by injecting code into the 'cid' parameter in the editItem function. Both vulnerabilities allow an attacker to execute arbitrary code or extract information from the database.

r57phpbb.pl – phpBB v<=2.06 search_id sql injection exploit (POC version)

This is a proof-of-concept exploit for a SQL injection vulnerability in phpBB version <=2.06. By manipulating the search_id parameter, an attacker can execute arbitrary SQL statements. The exploit retrieves the MD5 hash for a user with a specific user_id.

Mozilla (Firefox<=v1.04) InstallVersion->compareTo Remote Code Execution Exploit

This exploit allows remote code execution in Mozilla Firefox version 1.04 and below. It takes advantage of a vulnerability in the InstallVersion->compareTo function.

Lyris ListManager Attachment SQL Injection (MSSQL)

This module exploits a SQL injection flaw in the Lyris ListManager software for Microsoft SQL Server. This flaw allows for arbitrary commands to be executed with administrative privileges by calling the xp_cmdshell stored procedure. Additionally, a window of opportunity is opened during the ListManager for MSDE install process; the 'sa' account is set to the password 'lminstall' for a 5-10 minute period. After the installer finishes, the password is permanently set to 'lyris' followed by the process ID of the installer (a 1-5 digit number).

Website Baker 2.6.0 Login Bypass / Remote Command Execution

This exploit allows an attacker to bypass the login functionality in Website Baker version 2.6.0 and execute remote commands. It works when magic_quotes_gpc is turned off. The attacker needs to launch the exploit from Apache, fill in the requested fields, and then execute the commands.

Recent Exploits: