header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Social Web CMS X <= Beta 2 Vulnerabilities

Directory Listing: An attacker can view the directory structure of the application. XSS: An attacker can inject malicious JavaScript code into the application. CSRF: An attacker can add or remove friends, remove messages, and redirect users to malicious websites. Full Path Disclosure: An attacker can view the full path of the application. User Redirection: An attacker can redirect users to malicious websites.

Absolute Shopping Cart SQL Injection Vulnerability

Absolute Shopping Cart is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

3Com OfficeConnect ADSL Wireless 11g Firewall Router Remote DoS Exploit by HTTP

This exploit is for 3Com OfficeConnect ADSL Wireless 11g Firewall Router 3CRWDR100A-72 and 3CRWDR100Y-72 running on Software Version 2.06T13 (Apr 2007, last version for these routers). The bug can be exploited with Tamper Data (Firefox Addon) too. The exploit is written in Ruby and can be used to send a malicious HTTP packet with a Content-Type value that causes the DoS. 8.times is enough to DoS.

TLS Renegotiation Vulnerability (CVE-2009-3555)

This PoC exploit is for the TLS renegotiation vulnerability (CVE-2009-3555). It is a vulnerability in the TLS protocol which allows an attacker to inject plaintext into an otherwise encrypted communication. The attacker can inject data into the TLS connection by sending a TLS renegotiation request. This request can be sent in the middle of a TLS connection, allowing the attacker to inject plaintext into the encrypted communication.

Ultimate Uploader 1.3

Ultimate Uploader 1.3 is vulnerable to a remote file upload vulnerability. An attacker can upload a malicious file to the server by accessing the upload page of the script. The malicious file can be uploaded with any extension and can be accessed from the upload folder. This can be used to gain remote code execution on the server.

win32_exec

This exploit is a buffer overflow vulnerability in the win32_exec module of Metasploit. It allows an attacker to execute arbitrary code on the target system by overflowing a buffer with malicious code. The exploit uses an encoder called PexFnstenvMov to encode the malicious code and then injects it into the vulnerable application.

Drumbeat CMS SQL Injection Exploit

A SQL injection exploit is found in Drumbeat CMS. The vulnerability exists in where there is an index.php page, such as index02.php?id=5. or index03.php?id=2. Dork: 'Powered by Drumbeat' inurl:index02.php. Code: http://www.site.com/index02.php?id=-2+UNION+SELECT+ALL+group_concat(email,0x3a,username,0x3a,password)+from+auth_users--. You can usually replace the http://www.site.com/ with any site that is vulnerable to SQL injection.

phUploader Remote File Upload Vulnerability

A vulnerability exists in the phUploader script which allows an attacker to upload a malicious file to the server. The attacker can then access the malicious file by visiting the URL http://{target}/script path/uploads/shell.php.flac. A video demonstration of the exploit is available for download at http://filaty.com/f/912/99431/up5.rar.html.

Recent Exploits: