header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vastal I-Tech Visa Zone ( news_id ) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the URL. This will allow the attacker to gain access to the admin panel of the application.

The Real Estate Script ( view_ann.php ) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This request contains an SQL query that is designed to extract sensitive information from the database. The attacker can then use this information to gain access to the application or to launch further attacks.

webCMS Portal Edition (index.php id) Blind SQL Injection Exploit

This exploit is used to gain access to the webCMS Portal Edition by exploiting a blind SQL injection vulnerability in the index.php id parameter. It uses LWP::UserAgent to send requests and parse the HTML pattern to determine the user and password. It also has options to set the maximum table name length, the number of threads, and the timeout.

devalcms v1.4a Remote Code Execution Exploit / Xss

A vulnerability exists in devalcms v1.4a which allows an attacker to execute arbitrary code on the vulnerable system. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious JavaScript code to the vulnerable application. This can be done by sending a malicious HTTP request to the vulnerable application with the ‘currentpath’ parameter set to a malicious JavaScript code.

Remote Execution Exploit for AWStats Totals vulnerability (Interactive Shell) Version 2

This exploit allows an attacker to execute arbitrary commands on a vulnerable system. It works by sending a maliciously crafted HTTP request to the vulnerable system, which then executes the command. The exploit works with both magic quotes on or off.

Google Chrome 0.2.149.27 Buffer Overflow

The vulnerability is caused due to a boundary error when handling the “SaveAs” function. On saving a malicious page with an overly long title (<title> tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users’ systems.

MicroTik RouterOS <=3.13 SNMP write (Set request) PoC exploit.

A proof-of-concept exploit for a vulnerability in MicroTik RouterOS versions 2.9.51 (2.9.x branch) and 3.13 (3.x branch) that allows an attacker to write to the SNMP service. The MikroTik RouterOS supports SNMPv1 only, read-only access to the NMS (network management system), user-defined communities, Get and GetNext actions, but no Set support or Trap support.

ACG-ScriptShop (cid) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to the '/Script/index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the application's database, potentially allowing the attacker to bypass authentication, access, modify or delete data, or exploit other vulnerabilities in the underlying database or operating system.

Recent Exploits: