header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Lingxia I.C.E CMS Remote Blind SQL Injection Exploit

This exploit is a blind SQL injection vulnerability in Lingxia I.C.E CMS. It allows an attacker to gain access to the MySQL database, including the username and hashed password. The exploit works by sending a malicious HTTP request to the vulnerable server, which contains a SQL query that is used to extract the information from the database.

phpMyBitTorrent 2.0.4 SQL injection

The vulnerability exists in phpMyBitTorrent 2.0.4, which is an open source web-based BitTorrent tracker written in PHP and using a MySQL database. The vulnerability allows an attacker to inject arbitrary SQL commands via the 'id' parameter in the 'confirminvite.php' script. The attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands.

Path disclosure in RunCMS

The vulnerability exists due to failure in the "/include/registerform.php" script, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root dorectory of the vulnerable application.

Exploit Buffer Overflow CuteZip 2.1

This exploit has zip Copied exploits of the team Corelan. It is a vulnerability in the vulnerable function of CuteZip 2.1 build 9.24.1 which allows an attacker to execute arbitrary code by overflowing a buffer on the stack. The vulnerable function is located at 0x0047CC0E and contains instructions such as JB SHORT, REP MOVS, JMP DWORD, LEA ECX, AND EDX, MOV AL, SHR ECX, CMP ECX, and JB SHORT.

Pixelpost 1.7.3 Multiple POST Variables SQL Injection Vulnerability

Pixelpost is vulnerable to an SQL Injection attack when input is passed to several POST parameters (findfid, id, selectfcat, selectfmon, selectftag). The script (admin/index.php) fails to properly sanitize the input before being returned to the user allowing the attacker to compromise the entire DB system and view sensitive information.

Escort Agency CMS Blind SQL Injection Vunerability

The vulnerability exists in Escort Agency CMS, which is a web application developed by Escort Website Design. It allows an attacker to inject malicious SQL queries into the application, which can be used to extract sensitive information from the database. The vulnerability can be exploited by sending a specially crafted HTTP request containing a malicious SQL query to the application. The application will then execute the query and return the results to the attacker.

TaskFreak! v0.6.4 Multiple Cross-Site Scripting Vulnerabilities

TaskFreak! suffers from multiple XSS vulnerabilities when parsing input to multiple parameters in different scripts. The vulnerable POST parameters are: 'sContext', 'sort', 'dir' and 'show' thru index.php. Also the GET parameters 'dir' and 'show' thru 'print_list.php' are vulnerable. Header variable 'referer' is vulnerable thru rss.php script. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.

Kunena SQL Injection & Information Leakage

Because parameterized queries were not used, and adequate input sanitization was not done on the catids parameter on the advanced search page, it is possible for an attacker to run limited SQL commands on the server. Furthermore, when exploited with invalid SQL, it provides the full stacktrace. This gives the attacker the exact version of Kunena, PHP, and MySQL along with path to kunena.search.class.php. This path often starts with /home/username which discloses the username, which can then be used to launch further attacks.

Recent Exploits: