header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IT!CMS <= vers. SQL Injection Vulnerability

IT!CMS is prone to a SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects versions prior to IT!CMS 1.2.1.

Rosoft Media Player 4.2.1 Local Buffer Overflow Exploit(0-day)

There is a buffer overflow vulnerability in Rosoft Media Player 4.2.1 which affects all supported types (m3u, rml, txt) and all versions. The exploit involves writing a malicious file with a large number of characters followed by an address containing 0, NOT 0x00, and then the EIP and shellcode.

Goople <= 1.8.2 Blind SQL Injection Exploit

Goople <= 1.8.2 is vulnerable to Blind SQL Injection. This exploit uses a brute force attack to extract the username and password from the GoopleCMS_users_ table. The exploit sends a malicious POST request to the frontpage.php page with a crafted username and password. If the response time is greater than 4 seconds, it means the malicious payload was successful and the character is correct. The exploit then moves on to the next character in the key and continues the process until the username and password are extracted.

PHPAuctionSystem Multiple Remote File Inclusion Vulnerability

PHPAuctionSystem is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of the 'include_path' parameter in the 'settings.inc.php' file. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL can be used to include a remote file containing arbitrary code, which will be executed by the web server.

Oracle 10g SYS.LT.MERGEWORKSPACE SQL Injection Exploit

This exploit grants DBA privileges to the user 'scott' and creates a new OS user 'java' using java procedures. It was tested on Oracle 10.1.0.5.0 and was written by Alexandr 'Sh2kerr' Polyakov. The original advisory was written by Esteban Martinez Fayo of Team SHATTER and was published on November 11, 2008.

Recent Exploits: