header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NaviCopa Web Server 3.01 Remote Buffer Overflow Exploit

This exploit is for NaviCopa Web Server 3.01. It is a remote buffer overflow exploit which allows an attacker to gain remote access to the system. It was tested on Windows XP SP2 Francais and Win2k SP4 English. The exploit code binds a shell to port 7777.

New5starRating v1.0 (rating.php) Sql Inj. Vuln.

The vulnerability exists in the rating.php script, which allows an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can allow the attacker to gain access to the admin panel by exploiting the SQL injection vulnerability.

Netgear WNR2000 Wireless Router Vulnerabilities

A vulnerability exists in the Netgear WNR2000 wireless router running firmware 1.2.0.8, which allows an unauthenticated attacker to disclose the WPA/WPA2 password and administrator password. By simply requesting http://netgear/router-info.htm and http://netgear/cgi-bin/router-info.htm, the router will respond with the WPA/WPA2 passphrase. Additionally, by requesting http://netgear/cgi-bin/NETGEAR_WNR2000.cfg, the attacker can skip the first 128 bytes and gain access to the stored system. Reverse engineering the weak admin password authentication scheme is left as an exercise to the reader.

ITechBids v8.0 Blind SQL Injection Exploit

This exploit is used to gain access to the ITechBids v8.0 database by exploiting a blind SQL injection vulnerability. The exploit uses a User Agent to send a malicious query to the server, which then returns a response indicating whether the query was successful or not. The exploit then uses this response to determine the value of the password stored in the database.

Uebimiau Webmail v3.2.0-2.0

Uebimiau Webmail v3.2.0-2.0 is vulnerable to an arbitrary admins database disclosure vulnerability. An attacker can exploit this vulnerability by sending a GET request to the target URL with the path '/inc/database/system_admin/admin.ucf' to retrieve the username and password in MD5 format. The attacker can then use the credentials to log in to the admin panel at '/admin/login.php'.

Dow Group admin by pass (new.php)

This vulnerability allows an attacker to bypass authentication and gain access to the admin panel of a website powered and designed by Dow Group. The attacker can use the Google dork 'intext:"powered and designed by Dow Group"' to find vulnerable websites. The attacker can then use the demo URL to bypass authentication and gain access to the admin panel. The default username and password are 'nabadmin' and 'nabadmin_123' respectively.

Lanai Core v 0.6 Remote File Disclosure / IG

A vulnerability in Lanai Core v 0.6 allows an attacker to remotely disclose files on the server. This is done by sending a specially crafted HTTP request to the download.php script in the modules/backup directory, with the parameter ‘f’ set to ‘../config.inc.php’. This will cause the contents of the config.inc.php file to be sent to the attacker.

Recent Exploits: