header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DE Classifieds(cat_id) SQL injection

An attacker can exploit a SQL injection vulnerability in DE Classifieds by sending a maliciously crafted HTTP request to the showCat.php script with a specially crafted cat_id parameter. This can allow an attacker to extract sensitive information from the database, such as usernames and passwords.

RunCMS Module Photo 3.02 SQL injection

RunCMS Photo Version 3.02 module is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the admin credentials. The vulnerable parameter is 'id' in the URL 'modules/photo/viewcat.php?id=150&cid=-99999/**/union/**/select/**/0,uname/**/from/**/runcms_users/*' and 'pass' in the URL 'modules/photo/viewcat.php?id=150&cid=-99999/**/union/**/select/**/0,pass/**/from/**/runcms_users/*'. The Dorks used to find vulnerable sites are 'allinurl: "modules/photo/viewcat.php?id"' and 'inurl:photo "powered by runcms"'.

ZyXEL ZyWALL Quagga/Zebra Remote Root Vulnerability

The vulnerability in the Quagga/Zebra routing daemon, exists due to the fact that the appliance fails to change the password needed to login into the Quagga/Zebra daemon running on ports 2601, 2602 (Quagga/RIP) & 2604 (Quagga/OSPF) /TCP, even though the password of the appliance has been changed an attacker can still use the default password ‘zebra’ to log into the Quagga/Zebra service to view and manipulate the routing information etc. of the appliance.

phpAddressBook v2.11 Multiple Local File Inclusion Vulnerabilities

phpAddressBook v2.11 is prone to multiple local file inclusion vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to include arbitrary local files and execute arbitrary code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation.

Microsoft Office Excel Code Execution Exploit (MS08-014)

This exploit allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record in the 'SST' stream, which triggers a buffer overflow. This vulnerability affects Microsoft Office Excel 2000, 2002, 2003, 2004, and 2008.

ASPapp KnowledgeBase (content_by_cat.asp?catid) SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied input passed via the 'catid' parameter to the 'content_by_cat.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database, modify data, execute administration operations, etc.

RunCMS Module Section (artid) Remote SQL Injection Vulnerability

RunCMS is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. RunCMS versions prior to 1.6.2 are vulnerable.

Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Sun Solaris. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rpc.ypupdated service. This service is used to update the NIS maps on a system. The service does not properly validate the length of user-supplied data before copying it to a fixed-length stack buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of root.

Mambo Component com_restaurante SQL Injection

An attacker can exploit a SQL injection vulnerability in the Mambo Component com_restaurante. By sending a specially crafted HTTP request, an attacker can execute arbitrary SQL commands on the underlying database. This can be used to gain access to sensitive information stored in the database, modify data, or exploit other vulnerabilities in the database server software.

Recent Exploits: