header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PhpMyLogon SQL Injection

The PhpMyLogon application is vulnerable to SQL injection. By manipulating the username field during the login process, an attacker can bypass authentication and gain unauthorized access to the application. The vulnerable code retrieves user information from the database using a SQL query that is constructed with user-supplied input without proper sanitization or parameterization, allowing an attacker to inject malicious SQL statements. This vulnerability can be exploited by entering a specially crafted username, such as 'blake' or '1'='1' #', which will cause the query to return all records from the database, effectively bypassing the authentication check. This allows the attacker to log in as any user without knowing their password.

MicroWorld eScan Antivirus Remote Root Command Execution

The vulnerability exists in the forgotpassword.php file of MicroWorld eScan Antivirus < 3.x on Linux. The script does not properly validate user input in the 'uname' parameter, allowing an attacker to inject malicious commands and execute them with root privileges. By sending a specially crafted POST request to the forgotpassword.php script, an attacker can execute arbitrary commands on the target system.

WinAce Buffer Overflow

Local exploitation of a buffer overflow vulnerability in WinAce allows attackers to execute arbitrary code. When WinAce attempts to compress any file, it creates a temporary file that contains the location of the file to be compressed. The vulnerability occurs when parsing temporary files with long file entries. Opening a malicious tmp file will cause WinAce to crash and potentially allow for code execution.

Recent Exploits: