header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SazCart <= v1.5.1 (details&prodid) Remote SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL code into the vulnerable SazCart application. The vulnerable parameter is the 'prodid' parameter in the 'details' page. By exploiting this vulnerability, an attacker can gain access to the database, user, and version information.

Admidio 1.4.8 Remote File Disclosure

Admidio 1.4.8 is vulnerable to a remote file disclosure vulnerability. An attacker can exploit this vulnerability to gain access to sensitive files on the server. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter of the 'get_file.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This will allow the attacker to read arbitrary files on the server.

MiniBloggie Arbitrary Delete Post Vulnerability

The MiniBloggie application is vulnerable to an arbitrary delete post vulnerability. An attacker can delete any post from the application by sending a crafted HTTP request to the del.php page with the post_id parameter set to the ID of the post to be deleted and the confirm parameter set to yes.

Microsoft Terminal Server Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Terminal Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the TPKT length field. By sending a specially crafted packet with an overly large length field, an attacker can cause a stack-based buffer overflow. This can be leveraged to execute arbitrary code under the context of the SYSTEM user.

ezContents CMS Version 2.0.0 SQL Injection Vulnerabilities

ezContents CMS Version 2.0.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerable code is present in the showdetails.php and printer.php files. An attacker can exploit this vulnerability by sending a specially crafted HTTP GET request to the vulnerable files. The payloads used in the exploit are: showdetails.php: $strQuery = "SELECT * FROM ".$GLOBALS["eztbContents"]." WHERE contentname ='".$HTTP_GET_VARS["contentname"]."' AND language='".$GLOBALS["gsLanguage"]."'"; printer.php: $strQuery = "SELECT * FROM ".$GLOBALS["eztbContents"]." WHERE contentname ='".$HTTP_GET_VARS["article"]."' AND language='".$GLOBALS["gsLanguage"]."'";

Recent Exploits: