header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Koobi Pro v6.1 gallery (img_id)

This exploit allows an attacker to gain access to the admin panel of Koobi Pro v6.1 gallery by exploiting a SQL injection vulnerability in the img_id parameter of the index.php page. The attacker can use the DORK 1 to find vulnerable websites and then use the EXPLOiT to gain access to the admin panel.

Mini-stream ripper => 3.0.1.1 (.pls) Local Universal Buffer Overflow Exploit

Mini-stream ripper version 3.0.1.1 is vulnerable to a local universal buffer overflow exploit. The exploit is triggered when a maliciously crafted .pls file is opened. The malicious .pls file contains a payload of 1000 bytes of NOP instructions followed by a shellcode. The shellcode is designed to connect back to the attacker's machine on port 4444. The exploit was tested on Windows XP SP3.

Cybershade CMS 0.2 Remote File Inclusion Vulnerability

Cybershade CMS 0.2 is vulnerable to a Remote File Inclusion vulnerability due to the lack of sanitization of user-supplied input in the 'CMS_ROOT' parameter in the 'core.php' and 'includes.php' scripts. An attacker can exploit this vulnerability by sending a malicious URL in the 'CMS_ROOT' parameter, which will be executed by the vulnerable application.

Joomla Component com_trabalhe_conosco Cross Site Scripting Vulnerabilities

A Cross Site Scripting vulnerability exists in the Joomla Component com_trabalhe_conosco, which allows an attacker to inject malicious JavaScript code into the vulnerable application. This code can be used to steal user cookies and gain access to the administrator account. The vulnerability can be exploited by sending a specially crafted HTTP request containing malicious JavaScript code to the vulnerable application.

Joomla Component com_oprykningspoint_mc Cross Site Scripting Vulnerabilities

com_oprykningspoint_mc is vulnerable to Cross Site Scripting (XSS) attacks. An attacker can inject malicious JavaScript code into the vulnerable parameter of the application, which can be executed in the browser of the victim. This can be used to steal user cookies, hijack user sessions, redirect users to malicious websites, etc.

Joomla Component com_qpersonel Cross Site Scripting Vulnerabilities

com_qpersonel is a Joomla component that is vulnerable to Cross Site Scripting (XSS) attacks. An attacker can inject malicious JavaScript code into the 'personel_sira' parameter of the 'index.php' script. This code will be executed in the browser of the victim when they visit the vulnerable page. The malicious code can be used to steal the administrator and user cookies, which can then be used to gain access to the Joomla website.

Recent Exploits: