header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

POC Memory disclosure/ Denial Of Service

A vulnerability exists in the dpwinsup module of dpwingad process running at 3817/TCP port dpwinsup.10275F80. The bug is triggered when a specially crafted packet is sent to the vulnerable server. This can lead to a denial of service or memory disclosure.

Zen Cart 1.3.8 Remote SQL Execution

Zen Cart 1.3.8 is vulnerable to a Remote SQL Execution vulnerability. This vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to the lack of proper input validation in the 'admin/sqlpatch.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script.

Zen Cart 1.3.8 Remote Code Execution

Zen Cart 1.3.8 is vulnerable to a Remote Code Execution vulnerability. An attacker can exploit this vulnerability by uploading a malicious PHP file to the /images/ directory of the web server. The attacker can then execute arbitrary commands on the server by sending a HTTP request with a 'SHEL' header containing the command to be executed.

Mybb <= 1.4.4 Remote Code Execution through Sql Injection Exploit

This exploit allows an attacker to gain remote code execution on a vulnerable Mybb <= 1.4.4 system. The exploit requires a valid user account (not necessarily email confirmed) and the --admindir flag. The exploit first logs in with the provided credentials, turns on the invisible mode, injects a SQL code to gain admin privileges, finds the admin sid, backdoors the site, injects a SQL code to gain user privileges, and backdoors the site again. The backdoor URI is then provided to the attacker.

RS-CMS 2.1 (rscms_mod_newsview.php key) Remote SQL Injection Vulnerability

A vulnerability exists in RS-CMS 2.1, which allows a remote attacker to inject arbitrary SQL commands via the 'key' parameter in 'rscms_mod_newsview.php' script. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands.

Joomla Component com_tickets (id) SQL-injection Vulnerability

A vulnerability exists in Joomla Component com_tickets (id) which allows an attacker to inject arbitrary SQL commands via the 'id' parameter. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 0.1 and 2.1. Demo Live Joomla and Mambo versions are also provided.

Kasseler-Cms (Reafile/XSS) Multiple Remote Vulnerabilities

Kasseler CMS is prone to multiple remote vulnerabilities, including a readfile vulnerability and a cross-site scripting vulnerability. An attacker can exploit these issues to read sensitive files from the server, or to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Gravy Media Photo Host 1.0.8 Local File Inclusion

Gravy Media Photo Host 1.0.8 is vulnerable to Local File Inclusion. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'file' parameter of the 'forcedownload.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow an attacker to read sensitive files from the server, such as the '/etc/passwd' file.

Recent Exploits: