header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Fusion v6.00.109 SQL Injection / admin|users credentials disclosure

This exploit allows an attacker to disclose the admin and users credentials in PHP-Fusion v6.00.109. By manipulating the 'msg_send' parameter in the 'messages.php' file, an attacker can execute a UNION SELECT query to retrieve the user_password from the fusion_users table where the user_name matches the admin_username. This vulnerability can be exploited if magic_quotes is turned off.

Memorial Web Site Script –> Reset Password & Insecure Cookie Handling

To reset the password just use this: http://127.0.0.1/[path]/admin/change_pass.php so the password will be null, login with single user can admin: http://127.0.0.1/[path]/admin/ Insecure Cookie Handling exploit: javascript:document.cookie="logged=admin;path=/"; http://127.0.0.1/[path]/admin/

EDraw Flowchart ActiveX Control 2.3 (.edd parsing) Remote Buffer Overflow PoC

EDraw Flowchart ActiveX Control version 2.3 suffers from a buffer overflow vulnerability when parsing .edd file format resulting in an application crash and overwritten few memory registers which can aid the attacker to execute arbitrary code.

EDraw Flowchart ActiveX Control 2.3 (EDImage.ocx) Remote DoS Exploit (IE)

This exploit targets the EDraw Flowchart ActiveX Control 2.3 (EDImage.ocx) and causes a remote Denial of Service (DoS) attack. By providing a large string as an argument to the 'OpenDocument' function, the control crashes, resulting in a DoS condition. This exploit specifically targets Internet Explorer.

Remote Command Execution in Cacti

Cacti is prone to a remote command execution vulnerability because the software fails to adequately sanitize user-suplied input. Successful attacks can compromise the affected software and possibly the operating system running Cacti. The vulnerability can be triggered by any user performing specific actions.

Recent Exploits: