header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

dreamnews (rss) Remote SQL Injection Vulnerability

dreamnews (rss) is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

PICS BUILDER (page) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable page parameter. This can be done by appending a malicious SQL query to the vulnerable page parameter in the URL. For example, www.[target].com/Script/?page=-2+union+select+null,null,null,null,concat_ws(0x3a,user_login,user_password),null,null,null+from+users--

AuraCMS <= 2.2.2 (pages_data.php) Arbitrary Edit/Add/Delete data halaman exploit

AuraCMS version 2.2.2 and below is vulnerable to an arbitrary edit/add/delete data halaman exploit. The pages_data.php file from the beginning to the end does not have a clear rule, who, rights, level in accessing this file. This file contains code that can delete, add, and edit data halaman in the auracms database, so without a clear rule in the pages_data.php file, this file must have a very disgusting bug.... huee..... :(

Download Accelerator Plus – DAP 8.x (m3u) 0day Local Buffer Overflow Exploit

This exploit is for Download Accelerator Plus 8.x (m3u) 0day Local Buffer Overflow. The bug was discovered by Krystian Kloskowski (h07) and tested on Download Accelerator Plus 8.6 / XP SP2 Polish. The exploit uses a Windows Execute Command (calc) shellcode and the return address is JMP ESP (SHELL32.DLL / XP SP2 Polish). The exploit creates an evil.m3u file which can be imported and clicked on 'Verify' to execute the shellcode.

Last Minute Script <= 4.0 Remote SQL Injection Vulnerability

Last Minute Script 4.0 (and all prior versions) suffer from a multirow SQL injection flaw, This allows the remote attacker to execute arbitrary MySQL querys, and possibly gaining access to confidential information. Passwords are in plaintext.

Joomla Component com_content SQL Injection Vulnerabity

An SQL injection vulnerability exists in the com_content component of Joomla! CMS. An attacker can send a specially crafted request to the vulnerable application in order to execute arbitrary SQL commands in application's database. This can be exploited to disclose sensitive information from the database, modify data, compromise the integrity of data, and potentially compromise the underlying system.

Recent Exploits: