header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AllMyGuests SQL Injection Vulnerability

AllMyGuests is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

PhShoutBox <= 1.5 (final) Insecure Cookie Handling (Arbitrary Authentication)

PhShoutBox suffers from insecure cookie handling, allowing the remote attacker to craft a cookie that makes the attacker look like a admin, this works because the admin panel only checks the password if a password has been posted using the php vars "$_POST" if POST isnt set, then the cookies will be checked for existance if they exist then it will grant admin. The javascript code below is the easyiesy way to do this, just paste it in your browser whilst at the vulnerable site, then visit "admin.php".

2532|Gigs <= 1.2.2 Arbitrary Remote Database Backup/Download

2532|Gigs does not validate a user in 'backup.php' this means any user can visit and backup. of course some GET variables are being used but thats all. running the below url/path on a server that is running 2532|Gigs will make a backup of the database and save it too 'http://site.com/2532gigs/backup.sql'

Microsoft Works 7 WkImgSrv.dll crash POC

This proof-of-concept code exploits a buffer overflow vulnerability in Microsoft Works 7. The vulnerability is caused due to a boundary error in the WkImgSrv.dll module when handling a specially crafted HTML file. This can be exploited to cause a stack-based buffer overflow via an overly long argument passed to the WksPictureInterface property of the WkImgSrv.dll ActiveX control. Successful exploitation may allow execution of arbitrary code.

Recent Exploits: