header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Total Video Player V1.31 Local Stack Overflow

Total Video Player V1.31 is vulnerable to a local stack overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted malicious file to the victim. This will cause a buffer overflow and allow the attacker to execute arbitrary code on the victim's system.

LinPHA Photo Gallery 2.0 Alpha Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the vulnerable system. The exploit works by creating a new language file with malicious code and then editing it to execute the code. The exploit was tested on a local system with magic quotes set to off.

AJAuctionPro OOPD v2.3 SQL Injection Vulnerability

AJAuctionPro OOPD v2.3 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Max.Blog 1.0.6 Delete Post Exploit

Max.Blog 1.0.6 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Joomla com_waticketsystem Blind SQL Injection Exploit

This exploit is used to gain access to the username and password of a Joomla website using the com_waticketsystem component. The exploit uses a blind SQL injection technique to extract the username and password from the database. The exploit is executed by passing the URL of the website as an argument to the exploit script.

PHPAds 2.0 XSS Vulnerability

Due to insufficient validation of client-side data, an attacker can inject script directly into the code displayed as an advertisement to users. When making a new advertisement (or editing an old one), an attacker can fill the Ad Name field with malicious code and submit the form as usual. Whenever that particular ad is viewed, the script is executed.

Ninja Blog 4.8 Path Disclosure Vulnerability

Due to insufficient validation of client-side data, an attacker can alter the path of files to be read to a file outside the intended directory. The following PoC will read a file named 'test.txt' one level above the application folder.

RCBlog 1.03 Authentication Bypass

RCBlog 1.03 is vulnerable to an authentication bypass vulnerability. By default, the application provides public access to the text file which stores the MD5 hashes of the username/password and these can be found at http://www.example.com/rcblog/config/password.txt. By combining the hashes into one large string and crafting it in a “rcb_id” cookie in the following order: Directory -> IP Address -> Username -> Password, an attacker can gain administrative privileges.

Gallery Kys 1.0 Admin Password Disclosure / Permanent XSS

Gallery Kys 1.0 is vulnerable to an admin password disclosure and permanent XSS. The admin password is stored in plaintext in the config.inc file, which can be accessed directly. Additionally, the uploadform.php file does not properly filter user input, allowing an attacker to inject malicious JavaScript code into the description field.

Recent Exploits: