header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

r57phpbb_admin2exec.pl

This exploit allows an attacker to execute commands on a phpBB forum through the admin_styles.php file. It has been tested on phpBB version 2.0.13. The exploit works by creating a new style and running SQL queries in the database. The attacker can then execute commands through the created file. The exploit also has the ability to retrieve the database prefix.

Multiple Vulnerability in ASPCode CMS

Multiple vulnerabilities have been found in ASPCode CMS. These include multiple XSS vulnerabilities, persistent XSS vulnerability, CSRF vulnerability, and a possible SQL injection vulnerability. The XSS vulnerabilities can be exploited through various URLs, including default.asp?sec=1&ma1= and default.asp?sec=1&tag=. The persistent XSS vulnerability can be exploited by posting in the guestbook section. The CSRF vulnerability allows an attacker to delete a user account or create a super admin account. The possible SQL injection vulnerability can be exploited through the URL default.asp?sec=64&ma1=tag&tag=CMS'.

versatileBulletinBoard 1.00 RC2 SQL Injection/board takeover

This exploit allows an attacker to reset the admin password in versatileBulletinBoard 1.00 RC2. The vulnerability can be found at http://rgod.altervista.org/versatile100RC2.html. The exploit works regardless of the magic_quotes setting.

SoftBizScripts Dating Script SQL Injection Vunerability

The SoftBizScripts Dating Script is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'browse' parameter of the search_results.php page. This allows the attacker to retrieve sensitive information from the database.

Bigant Messenger <= v2.52 - (AntCore.dll) RegisterCom() Remote 0day Heap Overflow Exploit

This exploit targets a heap overflow vulnerability in the RegisterCom() function of the AntCore.dll library in Bigant Messenger version 2.52 and earlier. The vulnerability allows an attacker to remotely execute arbitrary code on a vulnerable system. The exploit takes advantage of this vulnerability to create a custom HTTP response that triggers the overflow and executes the attacker's code. This exploit has been tested on Windows XP SP3 with Internet Explorer 6 and 7.

avast! 4.7 aavmker4.sys privilege escalation

This exploit allows an attacker to escalate privileges in avast! 4.7 by manipulating aavmker4.sys driver. The vulnerability has been assigned CVE-2008-1625. The exploit has been tested on Windows XP SP2 and SP3 with DEP turned on. The exploit was created by Matteo Memelli and can be found at offensive-security.com.

Recent Exploits: