header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Hot Links SQL / Hot Links SQL-PHP Version 3.2.0 Insecure Cookie Handling Vulnerability

A vulnerability exists in Hot Links SQL / Hot Links SQL-PHP Version 3.2.0 which allows an attacker to set an admin cookie by using a malicious JavaScript code. This can be exploited to gain administrative access to the application.

Submitter Script 2(Auth Bypass) SQL Injection Vulnerability

An authentication bypass vulnerability exists in Submitter Script 2, which allows an attacker to gain access to the admin panel without valid credentials. This is due to the application not properly sanitizing user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying a specially crafted username and password, such as ' or '1=1. This will cause the application to bypass authentication and grant the attacker access to the admin panel.

ClickBank Directory Version 1.0.1 Insecure Cookie Handling Vulnerability

A vulnerability exists in ClickBank Directory Version 1.0.1 which allows an attacker to set an insecure cookie to gain access to the admin panel. The exploit code is 'javascript:document.cookie="clickbank=Logged+In;path=/";' and the vulnerable URL is 'http://www.mrcgiguy.com/clickbank/admin.php'.

StrawBerry 1.1.1 LFI / Remote Command Execution Exploit

This exploit is used to gain access to the StrawBerry 1.1.1 web application. It is a combination of Local File Inclusion (LFI) and Remote Command Execution (RCE). The exploit is triggered by sending a POST request to the vulnerable application with malicious code in the comment field. This code is then executed by the application, allowing the attacker to gain access to the application.

beLive version: v.0.2.3

A directory traversal vulnerability exists in beLive version: v.0.2.3. An attacker can exploit this vulnerability to read arbitrary files from the server. This is done by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable server. This can be exploited to read sensitive files from the server, such as the /etc/passwd file.

GNU/Linux kernel 2.6.29 ptrace_attach() local root race condition exploit.

This is a local root exploit for the 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions. The vulnerability is caused due to "ptrace_attach()" using an inadequate mutex while synchronizing with "execve()". This can be exploited to potentially execute arbitrary code with root privileges by attaching to a setuid process. The race is particularly narrow, this exploit checks that it has attached to the correct process before attempting to inject shellcode which helps reduce false positives and shells being spawned with lower privileges.

DigiMode Maya 1.0.2 (.M3U & .M3L File) Local Buffer Overflow PoC

DigiMode Maya 1.0.2 is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.

My Game Script V2.0 (Auth Bypass) SQL Injection Vulnerability

A SQL injection vulnerability exists in My Game Script V2.0, which allows an attacker to bypass authentication by entering a username of 'admin_name' or '1=1' and a blank password. This can be exploited by sending a specially crafted HTTP request to the vulnerable application.

Ascad Networks 5 Products Insecure Cookie Handling Vulnerability

Ascad Networks 5 products are vulnerable to insecure cookie handling. An attacker can set a cookie with the name 'c7portal' and value 'admin' to gain administrative access. The vulnerable products are c7 Portal v1.1.0, Password Protector SD v2 (ppSD2) and Form Processor Gold. The dork for c7 Portal is 'intitle:"c7 Portal by Ascad Networks"'

MLFFAT 2.1 – insecure Cookie Handling

A vulnerability in MLFFAT 2.1 allows an attacker to gain administrative access by setting a malicious cookie. The cookie is set using a JavaScript code which sets the cookie to a value of 'OmFkbWluJyBvciAnMSc9JzE6MjEyMzJmMjk3YTU3YTVhNzQzODk0YTBlNGE4MDFmYzM='. This cookie can then be used to access the administrative control panel located at './cpanel/index.php'.

Recent Exploits: