header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XOOPS WF_Downloads Module v 2.05 SQL injection / Admin credentials disclosure & remote commands execution all-in-one

XOOPS WF_Downloads Module v 2.05 is vulnerable to SQL injection, which allows an attacker to disclose admin credentials and execute remote commands. The vulnerability is due to insufficient sanitization of user-supplied input in the 'xoopsConfig[language]' parameter of the 'editor_registry.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request containing a specially crafted 'xoopsConfig[language]' parameter to the vulnerable script. This will allow the attacker to disclose admin credentials and execute remote commands.

Rankings for (name) will state the md5 hash for the user /str0ke

This vulnerability allows an attacker to inject arbitrary SQL code into the ibProArcade and vBulletin forums. By exploiting this vulnerability, an attacker can gain access to the database and extract sensitive information such as usernames and passwords.

HTTP Header Injection Vulnerability in Win32 Platforms

HTTP Header Injection is a vulnerability that occurs when user input is not properly sanitized and is then used as part of an HTTP request header. This can allow an attacker to inject arbitrary HTTP headers, which can be used to launch further attacks such as Cross-Site Scripting (XSS) or Cross-Site Request Forgery (CSRF). This vulnerability affects Win32 platforms and can be exploited by sending a specially crafted HTTP request to the vulnerable server.

Windows Winsock Error Handling

This code snippet is a demonstration of how to handle errors in Windows Winsock. It includes a switch statement that contains a list of errors and their corresponding messages. If an error occurs, the code will print the corresponding error message. This code could be used to create a buffer overflow vulnerability if the error messages are not properly sanitized.

Recent Exploits: