header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Chipmunk Blog Add Admin Exploit/Auth Bypass

Chipmunk Blog is vulnerable to an authentication bypass vulnerability. An attacker can exploit this vulnerability to gain administrative access to the application. This is due to the application not properly sanitizing user-supplied input to the 'username' and 'password' parameters in the 'reguser.php' and 'authenticate.php' scripts. An attacker can exploit this vulnerability by supplying a specially crafted 'username' and 'password' parameters when authenticating to the application.

GameScript 4.6 Multiple Vulnerabillities

The GameScript 4.6 web application is vulnerable to XSS, SQL Injection and Local File Include attacks. An attacker can inject malicious JavaScript code into the search parameter of the /games.php page, inject malicious SQL code into the user parameter of the /page.php page, and include a malicious file into the file_to_include parameter of the /page.php page.

Zinf Audio Player 2.2.1 (M3U FILE) Local Heap Overflow

A heap overflow vulnerability exists in Zinf Audio Player 2.2.1 when processing a specially crafted M3U file. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability is caused due to a boundary error within the processing of the M3U file. This can be exploited to cause a stack-based buffer overflow by passing an overly long string to the affected application.

Zinf Audio Player 2.2.1 (PLS File) Universal Local Buffer Overflow exploit

Zinf Audio Player 2.2.1 is vulnerable to a buffer overflow vulnerability when processing a specially crafted PLS file. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This exploit was tested in Windows Pro SP 2 (French).

SQL Injection in Max.Blog

This bug allows a guest to view username and password (md5) of a registered user with the specified id (usually 1 for the admin) by using the following URL: http://www.site.com/path/show_post.php?id=-1'+UNION+ALL+SELECT+1,concat('username: ', username),concat('password: ', password),4,5,6,7+FROM+users+WHERE+id=1%23

Flax Article Manager 1.1 Remote File Upload Vulnerability

A vulnerability in Flax Article Manager 1.1 allows an attacker to upload a malicious file to the server. An attacker can register on the site, choose a malicious file as their avatar, and the malicious file will be uploaded to the server. The malicious file can then be accessed by going to the profile page of the attacker and right-clicking on the avatar to view the properties. The malicious file can then be accessed by going to the URL of the malicious file.

Recent Exploits: