header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Windows Media Player 9.0/10.0/11.0 Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows Media Player 9.0/10.0/11.0 due to a boundary error when processing a specially crafted ASX file. This can be exploited to execute arbitrary code by tricking a user into opening a malicious ASX file.

Mix Systems CMS

Mix Systems CMS is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, emails, etc. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

PacerCMS 0.6 (last_module) Remote Code Execution Vulnerability

PacerCMS 0.6 is vulnerable to remote code execution. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable application. The request should contain a malicious payload in the last_module parameter. The payload should be URL-encoded and should be of the form t{};%20class%20t{};passthru(ls);// or t{};%20class%20t{};include(URL-SHELL);//. This will allow the attacker to execute arbitrary code on the vulnerable system.

SAPID CMF Build 87 (last_module) Remote Code Execution Vulnerability

A vulnerability exists in SAPID CMF Build 87 (last_module) which allows remote attackers to execute arbitrary code. This is due to the application failing to properly sanitize user-supplied input to the 'last_module' parameter of the 'adodb-perf-module.inc.php' script. An attacker can exploit this vulnerability by passing a malicious payload to the 'last_module' parameter, which will be executed by the vulnerable script.

ITechBids v.6.0 Gold Edition Sql Injection Exploit

The vulnerability exists in the detail.php page, where an attacker can inject malicious SQL code in the item_id parameter. An example of the exploit is (SQL)=-1%20union+select+1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36+from%20admin/*#

PKs Movie Database version 3.0.3

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'num' and 'category' parameters of 'index.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, steal cookie-based authentication credentials and launch other attacks.

Linux vmsplice Local Root Exploit

This exploit is a local privilege escalation vulnerability in the Linux kernel. It is based on a race condition in the vmsplice system call. The exploit uses a trampoline code to overwrite the uid and gid of the current process, allowing it to gain root privileges. The exploit works on Linux versions 2.6.23 to 2.6.24.

Journalness <= 4.1 Remote Code Execution exploit

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Journalness. Authentication is not required to exploit this vulnerability. The vulnerability is due to the 'includes/database/adodb-perf-module.inc.php' script not properly sanitizing user-supplied input to the 'last_module' parameter. An attacker can exploit this vulnerability to execute arbitrary code under the context of the webserver process.

Open-Realty <= 2.4.3 Remote Code Execution exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable Open-Realty version 2.4.3 or lower. The exploit requires the PHP configuration directive register_globals to be set to On. The exploit works by sending a crafted HTTP request to the vulnerable server, which includes the code to be executed. The code is then evaluated by the vulnerable server.

Recent Exploits: