header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AuraCMS 2.x (online.php) – Remote Blind SQL Injection Exploit

A vulnerability exists in AuraCMS 2.x versions 2.0, 2.1, and 2.2.1 due to improper sanitization of user-supplied input in the 'online.php' file. An attacker can exploit this vulnerability to inject malicious SQL commands via the 'HTTP_X_FORWARDED_FOR' header, which can be used to extract sensitive information from the database.

Powered by eXV2 WebChat 1.60 SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'roomid' parameter of 'index.php' script. A remote attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to gain access to sensitive data, modify or delete records in the database, execute administration operations on the system, etc.

Powered by eXV2 Viso 2.03 SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'kid' parameter to '/modules/viso/index.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Exploitation can be done by using two different exploits: 1) modules/viso/index.php?kid=-9999999/**/union/**/select/**/0,0x3a,uname,0x3a,0x3a,0x3a,pass/**/from/**/exv2_users/*where%20exv2_admin%201 2) modules/viso/index.php?kid=-9999999/**/union/**/select/**/0,0x3a,uname,0x3a,0x3a,0x3a,pass,pass/**/from/**/exv2_users/*where%20exv2_admin%201

Powered by eXV2 MyAnnonces 1.8 SQL Injection

A vulnerability exists in eXV2 MyAnnonces 1.8 which allows an attacker to inject arbitrary SQL commands. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'lid' parameter in the 'modules/MyAnnonces/annonces-p-f.php' script. This can be exploited to disclose the admin password and username.

VLC <= 0.8.6c,e buffer-overflow

This exploit is a local buffer overflow exploit for VLC versions 0.8.6c and 0.8.6e. It creates a .ssa file which contains a header, shellcode, NOP sled, and an AVI file. When the .ssa file is opened with VLC, the shellcode is executed, which in this case is a calculator. The exploit was created by cuongmx@gmail.com and Look2Me @ and tested on Windows XP Pro SP2.

MDAEMON (POST AUTH) REMOTE R00T IMAP FETCH COMMAND UNIVERSAL EXPLOIT 0day

This exploit allows an attacker to execute arbitrary code on a vulnerable MDAEMON IMAP server v9.6.4. The attacker can connect to the IMAP server, log in, select the Inbox folder, append a message with an evil buffer, and then send the evil buffer to execute arbitrary code on the server.

EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities

EasyGallery 5.0tr is vulnerable to multiple remote vulnerabilities including SQL Injection, Cross Site Scripting in URI and Cross Site Scripting. An attacker can exploit these vulnerabilities to gain unauthorized access to the application and execute malicious code.

EasyCalendar <= 4.0tr - Multiple Remote Vulnerabilities

EasyCalendar is vulnerable to multiple remote vulnerabilities including SQL Injection, Blind SQL Injection and Cross Site Scripting. The SQL Injection vulnerability exists in the calendar_backend.php file and can be exploited by sending a maliciously crafted HTTP request to the vulnerable server. The Blind SQL Injection vulnerability exists in the ajaxp_backend.php file and can be exploited by sending a maliciously crafted HTTP request to the vulnerable server. The Cross Site Scripting vulnerability exists in the calendar_backend.php file and can be exploited by sending a maliciously crafted HTTP request to the vulnerable server.

XOOPS Module Tutorials SQL Injection Vulnerability

XOOPS Module Tutorials is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Recent Exploits: