header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LulieBlog Version 1.02 Remote Sql Injection

A vulnerability exists in LulieBlog Version 1.02 which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in 'voircom.php'. An attacker can exploit this vulnerability to gain access to sensitive information from the database, modify data, delete data, or gain access to the server.

Foojan WMS 1.0 Remote Sql Injection

A vulnerability exists in Foojan WMS 1.0 which allows an attacker to inject arbitrary SQL commands via the 'story' parameter in the 'index.php' script. An attacker can exploit this vulnerability to gain access to the admin panel by injecting a malicious SQL query in the 'story' parameter. The malicious query will return the username and password of the admin panel.

Invision Gallery <=2.0.7 sql injection exploit

This exploit allows an attacker to inject malicious SQL code into a vulnerable Invision Gallery version <=2.0.7. The exploit code is written in Perl and uses Tk, Tk::BrowseEntry, Tk::DialogBox, and LWP::UserAgent modules. The exploit allows an attacker to get data from the database, create a new admin user, and set custom fields. The exploit code is unpublished and should be kept private.

RST/GHC unpublished PHP Nuke exploit <8

This exploit allows an attacker to gain access to the administrative account of a vulnerable PHP Nuke installation. The exploit works by sending a specially crafted HTTP request to the vulnerable server, which then returns the administrative account's password hash. The attacker can then use this hash to gain access to the administrative account.

YaBB SE version <= 1.5.5 commands execution exploit by RST/GHC

YaBB SE version <= 1.5.5 is vulnerable to command execution. This exploit code is coded by 1dt.w0lf and published by RST/GHC. It uses Tk and LWP::UserAgent modules to exploit the vulnerability. It uses a POST request to execute the command on the vulnerable server.

SetCMS v3.6.5 (setcms.org) remote commands execution exploit

This exploit allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'set' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary commands on the system with the privileges of the web server process.

HP Virtual Rooms WebHPVCInstall Control Buffer Overflow Exploit

This exploit is for a buffer overflow vulnerability in the HP Virtual Rooms WebHPVCInstall Control. It was written by e.b. and tested on Windows XP SP2 (fully patched) English, IE6, and hpvirtualrooms14.dll version 1.0.0.100. It is not reliable due to heap fragmentation issues. Thanks to rgod, h.d.m. and the Metasploit crew.

Recent Exploits: