header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BosNews v4.0 Remote Sql injection Exploit

This exploit allows an attacker to inject malicious SQL queries into the vulnerable BosNews v4.0 application. The vulnerable parameter is the ‘article’ parameter in the ‘news.php’ script. By appending a malicious SQL query to the vulnerable parameter, an attacker can gain access to the application’s database and extract sensitive information such as usernames and passwords.

HP OpenView NNM v7.5.1 ovalarmsrv.exe Remote Buffer Overflow Exploit

This exploit is used to overflow the EIP register by sending more than 524 bytes to the 2954 port. The exploit uses alphanumeric shellcodes and the ret address for the 7.5.1 version. The exploit is written for educational purpose only and can cause damage to the system.

BosClassifieds 3.0 Remote Sql injection Exploit

BosClassifieds 3.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'cat' in the 'index.php' file. An example of a malicious SQL query is '-666 union select 1,2,concat(username,password)from bosdevUUS/*'

Mumbo Jumbo Media – OP4 – Blind SQL Injection Exploit

Mumbo Jumbo Media - OP4 is vulnerable to Blind SQL Injection. This exploit allows an attacker to extract sensitive information from the database such as admin credentials. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application. The exploit code uses the 'file_get_contents' function to send the malicious request and extract the data from the response.

PostCard 1.0 Insecure Cookie Handling (Arbitrary Authentication)

PostCard 1.0 (and prior???) suffers from insecure cookie handling. To be able to view admin panel the user requires to login using a valid user/pass. After the valid user/pass has been passed and matches then a cookie is created. The admin panel checks to see if this cookie exists. If it does then user can access admin. Since the cookie doesn't contain no hash/pass/sid just a number '1' indicating we are logged in, the remote attacker can craft a cookie (working example below) to access admin.

cpCommerce Multiple Vulnerabilities

cpCommerce is an open-source e-commerce solution that is maintained by templates and modules. XSS vulnerability exists due to insufficient sanitization of user-supplied input in the 'obj' parameter of the 'calendar.php' script. SQL Injection vulnerability exists due to insufficient sanitization of user-supplied input in the 'id_product', 'id_manufacturer' and 'id_category' parameters of the 'display_page.func.php' script. Local File Inclusion vulnerability exists due to insufficient verification of user-supplied input in the 'language' and 'action' parameters of the 'language.act.php' and '_functions.php' scripts.

Recent Exploits: