header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OwnRS CMS (autor.php) SQL Injection Vulnerability

OwnRS CMS is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'autor.php' script.

Browser3D(.sfs file) Local Stack Overflow Exploit

This exploit is a local stack overflow exploit for Browser3D (.sfs file). It is coded in Perl and was released by AlpHaNiX in 2009. It takes advantage of a vulnerability in the Browser3D application, which allows an attacker to execute arbitrary code on the vulnerable system. The exploit code creates a malicious file which contains a payload of shellcode that is executed when the file is opened.

Joomla component beamospetition 1.0.12 Sql Injection / Xss

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mpid' parameter of the 'func=sign' action of the 'com_beamospetition' component. A remote attacker can execute arbitrary SQL commands in the application database, cause XSS, access or modify data, exploit vulnerabilities in the underlying database and compromise the system.

Joomla com_pcchess (game_id) Blind SQL Injection Exploit

This exploit is used to inject malicious SQL code into a vulnerable Joomla website. It takes advantage of the com_pcchess component, which is vulnerable to Blind SQL Injection. The exploit uses a loop to iterate through the characters of the username and password of the vulnerable website, and then prints them out.

AXIS 70U Network Document Server – Privilege Escalation and XSS

Local File Include vulnerability found in script user/help/help.shtml. User can unclude any local files even in admin folder. Linked XSS vulnerability found in scripts: user/help/help.shtml, user/help/general_help_user.shtml. Attacker can inject XSS script in URL.

Firefox 3.0.5 Status Bar Obfuscation / Clickjacking

This exploit uses the Firefox 3.0.5 Status Bar Obfuscation technique to redirect users to milw0rm.com when they click on a link to google.com. The exploit uses a div element with a mouseover event to redirect the user to milw0rm.com. The div element is positioned at the exact coordinates of the mouse pointer when the user clicks on the link.

GaZa WiLL NeVeR DiE

An attacker can exploit a SQL injection vulnerability in the 'bid' parameter of the 'index.php' script to execute arbitrary SQL commands. The vulnerable code is located in the 'com_sobi2' component. The attacker can use the 'union' SQL operator to access the 'jos_users' table and extract the username and password of the administrator.

Joomla component: BazaarBuilder Shopping Cart Software v.5.0 sql injection

A vulnerability exists in Joomla component BazaarBuilder Shopping Cart Software v.5.0 which allows an attacker to inject arbitrary SQL commands. This can be exploited to gain access to the admin panel and extract sensitive information from the database.

Recent Exploits: