header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Limbo cms v 1042Lt Cross-site request forgery Privilege Escalation Proof of Concept

A vulnerability in Limbo cms v 1042Lt allows an attacker to create a new user with administrator privileges. This is done by sending a crafted request to the vulnerable application. The attacker can then use the newly created user to gain access to the application.

Two_MircoSoft_Media_player_quartz.dll_wav_remote_Dos_vulnerabilities

Two Microsoft Media Player quartz.dll wav remote Denial of Service vulnerabilities were discovered by Code Audit Labs in 2009. The vulnerabilities affected Windows Media Player 10.00.00.3998 quartz.dll 6.5.3790.4283 and Windows Media Player 11.0.5721.5230 quartz.dll 6.5.2600.5596. Other versions may also be affected.

MircoSoft_Media_player_quartz.dll_mid_remote_Dos POC

A vulnerability exists within the quartz.dll code processing RMID header. If the data_id is not 'data' and midi_size is 0xfffffff8, the code would fall into an infinite loop.

Zervit Webserver Directory Traversal

Zervit Webserver is vulnerable to a directory traversal attack. This vulnerability allows an attacker to view arbitrary files on the server, including sensitive files such as boot.ini. The vulnerability is caused due to the improper sanitization of user-supplied input to the 'GET' parameter. This can be exploited to read arbitrary files on the server by sending a specially crafted HTTP request.

SMA-DB 0.3.13 Multiple Remote File Inclusion Vulnerabilities

Multiple Remote File Inclusion (RFI) vulnerabilities exist in SMA-DB 0.3.13. An attacker can exploit these vulnerabilities to include arbitrary files from remote locations and execute arbitrary code on the vulnerable system.

Powered by eLitius Version 1.0 Change Password

This vulnerability allows an attacker to bypass authentication and gain access to the admin panel of the eLitius Version 1.0. The vulnerability is due to the fact that the application does not properly validate the username and password fields. An attacker can exploit this vulnerability by setting the username and password fields to 'admin' and gain access to the admin panel.

NetHoteles v3.0 (ficha.php) SQL Injection Vulnerability

NetHoteles v3.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. This issue affects the 'id_establecimiento' parameter of the 'ficha.php' script.

Recent Exploits: