header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Fusion db backup proof-of-concept

When a database backup is made, it is saved in /administration/db_backups/ on 6.0 and on 5.0 it is saved in /fusion_admin/db_backups/. The backup file can be saved in 2 formats: .sql or .sql.gz and is hidden by a blank index.php file but can be downloaded client-side. An attacker can generate 0001 to 9999 and request the file and download it. If a db file is found, an attacker can get the admin hash and crack it or retrieve other sensitive information from the db.

Win32 Bind Shellcode

This exploit is a buffer overflow vulnerability in the Windows operating system. It allows an attacker to execute arbitrary code on the target system by overflowing a buffer with malicious code. The exploit is triggered when a user visits a malicious website or opens a malicious file. The malicious code is then executed on the target system, allowing the attacker to gain access to the system.

Forum Russian Board 4.2 Full (FRB) Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable Forum Russian Board 4.2 Full (FRB) installation. The exploit works by sending a specially crafted HTTP request to the vulnerable server, which then allows the attacker to execute arbitrary commands on the server.

PeerCast <= 0.1211 remote format string exploit

This exploit is a remote format string exploit for PeerCast <= 0.1211. It is a public release by Darkeagle and uKt researcherz. It binds a port 4444 and uses a buffer overflow to execute arbitrary code. It uses a malicious string to overwrite the return address of the vulnerable function and execute the malicious code.

Claroline E-Learning Application Remote SQL Exploit

Claroline is vulnerable to a remote SQL injection attack. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'uInfo' parameter in 'userInfo.php' and 'exercises_details.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable scripts.

Claroline E-Learning Application SQL Injection Vulnerability

A SQL injection vulnerability exists in Claroline E-Learning Application. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is due to improper sanitization of user-supplied input in the 'userInfo.php' and 'exercises_details.php' files. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

Recent Exploits: