header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Traidnt Up version 2.0 (Auth Bypass / Cookie) SQL Injection Vulnerability

A vulnerability exists in Traidnt Up version 2.0, which allows an attacker to bypass authentication and gain access to the application. This is due to the application not properly filtering user input in the 'adminquery.php' file. An attacker can exploit this vulnerability by setting the 'trupuser' and 'truppassword' cookies to malicious values such as 'admin' or '1'='1'. This will cause the application to return a true value, allowing the attacker to bypass authentication and gain access to the application.

Million Dollar Text Links <= 1.0 SQL injection

A SQL injection vulnerability exists in Million Dollar Text Links <= 1.0. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries to view, add, modify and delete records in the back-end database. This may aid in further attacks.

Zeus Cart V2.3 Sql Injection

Zeus Cart V2.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The attacker can use the ‘-9999+union+all+select+concat(0x6272306c79,0x3a,admin_id,0x3a,admin_name,0x3a,admin_password,0x3a,0x6272306c79)+from+admin_table--’ payload to exploit the vulnerability and gain access to the admin panel.

Acrobat <= 9.1.1 Stack Overflow Crashy PoC

This exploit is a proof-of-concept (PoC) for a stack overflow vulnerability in Adobe Acrobat Reader versions 9.1.1 and earlier. The vulnerability is triggered when a user opens a specially crafted PDF file, which causes a stack overflow and results in a crash. The exploit was published in 2009-crashy_the_clown.pdf.

Roxio CinePlayer 3.2 (SonicMediaPlayer.dll) Remote BOF Exploit

Roxio CinePlayer 3.2 is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control. This may facilitate unauthorized access.

Firefox Denial of Service (KEYGEN)

This bug is a simple design bug that results in an endless loop (and interesting memory leaks). Once upon a time Netscape thought it would be a great idea to add the keygen tag (<keygen>) as a feature to their Browser. The keygen tag offers a simple way of automatically generating key material using various algorithms. For instance it is possible to generate RSA, DSA and EC key material.

Joomla Component com_jvideo (user_id) SQL-injection Vulnerability

A SQL injection vulnerability exists in Joomla Component com_jvideo, which can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to the user_id parameter in the index.php script not being properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary SQL code in the context of the database user.

AMember – Multiple Vulnerabilities

aMember is a flexible membership and subscription management PHP script. It has support for PayPal, BeanStream, 2Checkout, NoChex, VeriSign PayFlow, Authorize.Net, PaySystems, Probilling, Multicards, E-Gold and Clickbank payment systems (see list of integrated payment systems) and allows you to setup paid-membership areas on your site. It can also be used without any payment system - you can manage users manually. CGI Systems' website has an XSS issue too, they obviously don't realise the impact of XSS.

Recent Exploits: