header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PwsPHP <= 1.2.4 (index.php) Remote SQL Injection Exploit

PwsPHP <= 1.2.4 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the application's database and potentially gain access to sensitive information.

phpWebSite topic SQL-Injection

This exploit allows an attacker to gain access to the user's credentials by exploiting a SQL injection vulnerability in the topics.php file of phpWebSite. The attacker can use the URL http://[server][path]/topics.php?op=viewtopic&topic=-1+Union+select+name,name,pass,name+From+users+where+uid=[uid] to gain access to the user's credentials.

Critical sql injection in phpNuke 7.5-7.8 Exploit

This exploit is a critical SQL injection vulnerability in phpNuke 7.5-7.8. It was found by Janek Vind 'waraxe' and allows an attacker to get the MD5 passwords of the users. The exploit is coded in VC++ and compiled in VC++. It is used to send a SQL injection to the vulnerable server and exploit it to get the MD5 passwords of the users.

NOCC Webmail <= 1.0 remote commands execution exploit through arbitrary local inclusion & attachment filename prediction

NOCC Webmail version 1.0 is vulnerable to remote commands execution exploit through arbitrary local inclusion & attachment filename prediction. This exploit works regardless of any magic_quotes_gpc settings. An attacker can upload an evil mail attachment and then try to include it, predicting its name and its location.

Noah’s classifieds 1.3 Remote Code Execution

Noah's classifieds 1.3 is vulnerable to a remote code execution vulnerability. This vulnerability is due to the lack of proper input validation in the application when handling user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Windows Media Player Exploit

This exploit code is intended only as a demonstration tool for educational or testing purposes. It is not intended to be used for any unauthorized or illicit purpose. Any testing done with this tool OR ANY PRODUCT OR ALTERATION THEREOF must be limited to systems that you own or are explicitly authorized to test. By utilizing or possessing this code, you assume any and all responsibility for damage that results. The author will not be held responsible, under any circumstances, for damage that arises from your possession or use of this code.

Recent Exploits: