header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SecurityGateway 1.0.1 Remote Buffer Overflow ( username)

SecurityGateway open port 4000 for remote administration/managment, EIP get owned when the username field is filled with 720 chars. Replace http://127.0.0.1:4000/ with your remote host. Use LWP::UserAgent to send a POST request with a payload of 236 'a' characters, 480 'b' characters, and 4 'c' characters to the SecurityGateway.dll page.

Joomla Component Joo!BB Blind SQL Injection Exploit

This exploit is a blind SQL injection vulnerability in the Joomla Component Joo!BB. It allows an attacker to extract the MD5 hash of a user's password by exploiting a vulnerability in the 'index.php' file. The exploit works by sending a specially crafted HTTP request to the vulnerable server, which then returns a response indicating whether the request was successful or not. The attacker can then use this response to determine the MD5 hash of the user's password.

I-Pos Internet Pay Online Store v1.3 Beta <= Remote SQL Injection Vulnerability

I-Pos Internet Pay Online Store v1.3 Beta is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

meBiblio 0.4.7 Remote SQL Injection/ Arbitrary File Upload Exploit / XSS Vulnerability

meBiblio 0.4.7 is vulnerable to SQL Injection, Arbitrary File Upload and XSS. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable application. An attacker can also upload a malicious file to the vulnerable application and execute it. An attacker can also inject malicious JavaScript code into the vulnerable application.

DesktopOnNet 3 Beta Remote File Inclusion

A Remote File Inclusion vulnerability exists in DesktopOnNet 3 Beta, which allows an attacker to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerability is due to the 'app_path' parameter in 'don3_requiem.php' and 'frontpage.php' scripts not properly sanitized before being used to include files.

Joomla Component mycontent Blind SQL Injection Exploit

This exploit is a blind SQL injection vulnerability in the Joomla Component mycontent. It allows an attacker to extract the MD5 hash of the password of a given user ID. The exploit works by sending a specially crafted HTTP request to the vulnerable server and then analyzing the response to determine the MD5 hash of the password.

ComicShout 2.8 (news.php news_id) Remote SQL Injection Vulnerability

A vulnerability exists in ComicShout 2.8, which can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to the 'news_id' parameter in the 'news.php' script not being properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary SQL commands.

Social Site Generator Remote File disclouse

A vulnerability in Social Site Generator allows an attacker to view the source code of any file on the server by appending the file name to the filedload.php, download.php, or download_file.php URL. This can be used to view the source code of any file on the server, including configuration files containing passwords and other sensitive information.

Recent Exploits: