header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Geomi CMS by Tridan IT [ Sql Injection Vunerability ]

A SQL injection vulnerability was discovered in Geomi CMS by Tridan IT. The vulnerability exists in the cms.php file, where an attacker can inject malicious SQL code into the categoryid parameter. This can be exploited to gain access to the database and potentially execute arbitrary code.

Horde Horde_Image::factory driver Argument Local File Inclusion

Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.

MoviePlay 4.82 (.lst) Buffer Overflow

MoviePlay 4.82 is vulnerable to a buffer overflow vulnerability when a specially crafted .lst file is opened. This can be exploited to execute arbitrary code by corrupting the stack. The exploit code is written in Python and it contains a payload that executes calc.exe when the vulnerable application is opened.

LocatePC 1.05 Arbitrary SELECT Query Vulnerability

A vulnerability in LocatePC 1.05 allows an attacker to execute arbitrary SELECT queries against the LocatePC and 'mysql' database. This can be used to extract information from the database, such as user names, MAC addresses, last login IPs, and program logins. It may also be possible to upload arbitrary files from each user's computer to the LocatePC database, and then to later extract those files from the database. Activating the software's keylogging functionality is also possible.

Unreal Tournament Remote Buffer Overflow Exploit (SEH) (Windows)

This exploit is a remote buffer overflow exploit for Unreal Tournament. It was discovered by Luigi Auriemma and coded by Fulcrum in 2011. It is a vulnerability in all UT99 servers without a patch. It has been tested on Windows 7 64-bit, XP SP3, Vista SP2 with UT v400, 436, 440, 451, 451b. It uses an alphanumeric decoder from Skylined and getEIP code taken from Heretic. It has a maximum shellcode size of 938 bytes and bad characters of 0x00 and 0x5c.

Enable Media Replace WordPress Plugin

A user can perform SQL Injection attacks against the plugin at the Replace Media Upload page (Media > Edit > Upload a new file). By changing the 'attachment_id' parameter in the URL to 'attachment_id=99999+union+select+concat(0x20,user_login),+user_pass+from+wp_users+where+ID=1', the plugin will retrieve and display the administrator's user name and password hash. This requires that the attacker has knowledge of the SQL table prefix, but that can be retrieved as well from information_schema.TABLES. A user can also upload arbitrary files, including PHP files, at the Replace Media Upload page using the 'Replace the file' functionality, which doesn't check if uploaded files have an allowed extension. This can be exploited to execute arbitrary PHP code and for instance retrieve or change sensitive information in the SQL database or the web server's file system.

MihanTools Script SQL Injection Vunerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'product.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to steal sensitive information from the database, modify data, deface the site, etc.

Web 2.0 Social Network Freunde Community SQL Injection

An attacker can exploit a SQL injection vulnerability in the Web 2.0 Social Network Freunde Community application. By sending a specially crafted HTTP request, an attacker can inject arbitrary SQL code into the application, allowing them to access, modify, or delete data from the back-end database.

Recent Exploits: