header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nitrotech 0.0.3a Multiple Remote Vulnerabilities

Nitrotech cms is vulnerable to multiple vulnerabilities, like remote file inclusion and sql injection. The first bug, the remote file inclusion, is caused becouse of an include of a non declarated variable. The second vulnerability is caused becouse of a direct use in a query of a get variable.

Quicksilver Forums <= 1.4.2 RCE Exploit (win only)

Quicksilver Forums version 1.4.2 and prior are vulnerable to a Local File Inclusion / Malicious Avatar Upload vulnerability. This vulnerability allows an attacker to upload a malicious avatar and include it to have a Remote Command Execution. This exploit works with windows servers only and works regardless php.ini settings. The bug is located in the file global.php, lines 318-329.

WebStudio CMS (pageid) Blind SQL Injection Vulnerability

WebStudio CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Bandwebsite Version 1.5 Sql & XSS Multiple Remote Vuln.

Bandwebsite Version 1.5 is vulnerable to SQL Injection and XSS attacks. An attacker can exploit this vulnerability by sending a maliciously crafted SQL query to the vulnerable script. An attacker can also exploit this vulnerability by sending a maliciously crafted XSS payload to the vulnerable script.

FTPZIK

A remote file inclusion vulnerability exists in FTPZIK, which allows an attacker to include a remote file containing malicious JavaScript code. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is caused due to insufficient sanitization of user-supplied input passed to the 'p' and 'c' parameters in 'index.php' and 'inc/cat.php' and 'inc/content.php' scripts. This can be exploited to include arbitrary files from external web servers and execute arbitrary HTML and script code in a user's browser session in context of an affected site.

W3C Amaya 10.1 Web Browser Amaya (id) Remote Stack Overflow Vulnerability

The application fails to correctly process certain bytes, such as 0x9c becoming 0x9cc2. After reviewing the source code, the below function modifies the shellcode: Line 902: int TtaWCToMBstring (wchar_t src, unsigned char **dest). The max value which can be used is 0x1fffff. The 'id' variable of a tag contains a buffer overflow, which will not overflow with normal alphanumeric characters. To fill the buffer, 'A/' must be repeated 91 times. The ESP points to data after EIP. A proof of concept is provided in the text.

VideoScript 3.0 <= 4.0.1.50 Official Shell Injection Exploit

VideoScript 3.0 is vulnerable to a remote shell injection vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. This vulnerability is due to insufficient sanitization of user-supplied input in the 'name' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system.

Goople CMS 1.7 Arbitrary File Creation

Logg yourself like a normal user then in your meno go on "Notepad" ( /win/notepad/index.php ), in this notepad you can make a php shell :P. Use this js code for bypass the log in: javascript:document.cookie = "loggedin=1; path=/"; And then go to /win/notepad/index.php

W3C Amaya 10.1 Web Browser

The URL bar contains a buffer overflow vulnerability with a buffer length of 1600 bytes. The application fails to correctly process certain bytes such as 0x9c which becomes 0x9cc2. After reviewing the source code, the below function modifies the shellcode: Line 902: int TtaWCToMBstring (wchar_t src, unsigned char **dest). The max value which can be used is 0x1fffff. To bypass the 800 character limit on the link, click the link then select 'Links' >> 'Create or change link...' and click 'Confirm'. Alternatively, copy the payload into the URL bar.

Recent Exploits: