header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Super CAPTCHA plugin <= 2.2.4 SQL Injection Vulnerability

The WordPress Super CAPTCHA plugin version 2.2.4 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the 'markspam' parameter in the 'admin.php' page of the plugin. This allows the attacker to execute arbitrary SQL queries on the underlying database.

WordPress Js-appointment plugin <= 1.5 SQL Injection Vulnerability

The WordPress Js-appointment plugin version 1.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'searchdata.php' file, which does not properly sanitize user-supplied input, resulting in SQL injection. This can lead to unauthorized access to the database and potentially allow the attacker to execute arbitrary SQL queries.

F-Secure Multiple Products ActiveX Remote SEH Overwrite Vulnerability(Heap Spray)

This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in multiple F-Secure products. It uses heap spray techniques to exploit the vulnerability.

WordPress MM Duplicate plugin <= 1.2 SQL Injection Vulnerability

The WordPress MM Duplicate plugin version 1.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'duplicate' parameter in the 'index.php' file. This can lead to unauthorized access, data manipulation, or data leakage.

WordPress Allow PHP in Posts and Pages plugin <= 2.0.0.RC1 SQL Injection Vulnerability

The vulnerability allows an attacker to perform SQL injection by manipulating the 'function' parameter in a POST request to the 'alter.php' file. By injecting malicious SQL code, an attacker can modify or delete data in the database.

SAGEM ROUTER FAST 3304/3464/3504 – Telnet Authentication bypass

Sagem Fast Routers (3304-V1 / 3304-V2 / 3464 / 3504) come with a default preconfigured root password that the ISPs don't change. Instead, they create another admin account above it. The root password differs from a router to another, since it is computed from its MAC address. Thus, each unique router has its own password, which makes brute force or dictionary attacks inefficient or impossible. After reverse engineering the algorithm that computes the default password based on the MAC address, this exploit opens a remote shell in the remote host. (Generally its an Almquist Shell 'ash', which commands are compatible with the Bourne Shell 'bsh')

Recent Exploits: