header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mambo Component n-form(form_id) Blind SQL Injection Exploit

This exploit is used to gain access to the password of a user in the Mambo Component n-form(form_id) by using a blind SQL injection. The exploit is written in Perl and uses the LWP::UserAgent module to send a malicious HTTP request to the vulnerable server. The malicious request contains a substring of the user's password and the response is used to determine the character of the substring. This process is repeated until the entire password is obtained.

V3 Chat – Profiles/Dating Script v3.0.2 Insecure Cookie Handling Vulnerability

V3 Chat - Profiles/Dating Script v3.0.2 is prone to an insecure cookie handling vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to gain administrative access to the application.

ZEEPROPERTY v1.0 remote file Upload & XSS

A vulnerability in ZEEPROPERTY v1.0 allows an attacker to upload a malicious file and execute XSS attacks. An attacker can register to the site, add a malicious code to the head of a shell file, upload the file, and then access the file via a direct link. The attacker can then use the link to execute XSS attacks.

SpeedStream 5200 Authentication Bypass

It is possible to bypass authentication by modifying the Host header. If you use a Host that is not the authentic one it will not require authentication. http://189.255.255.255./ would bypass authentication too. http://189.255.255.255./x.cfg downloads the full router configuration.

Recent Exploits: