header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Aqua CMS v1.1 Authentication Bypass and SQL Injection Vulnerabilities

Aqua CMS v1.1 is vulnerable to authentication bypass and SQL injection. An attacker can bypass authentication by sending a POST request with a username and password set to any value. An attacker can also inject SQL by sending a cookie with a userSID set to a malicious value. This can allow an attacker to gain access to sensitive information such as usernames and passwords.

GuestCal 2.1 (index.php lang) Local File Inclusion Vulnerability

GuestCal 2.1 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable application. This can allow an attacker to include arbitrary files from the web server's file system, such as the BOOTSECT.BAK file, which can be used to gain access to the system.

Revista 1.1.2

Revista is a simple spanish PHP magazine editor. It suffers from multiple vulnerabilities, including Remote File Inclusion, SQLi, Credentials Bypass, and XSS. Remote File Inclusion can be exploited by sending a malicious URL to the 'adodb' parameter. SQLi can be exploited by sending malicious SQL queries to the 'id_temas', 'cadena', 'id_autor', 'email', and 'id_articulo' parameters. Credentials Bypass can be exploited by sending a malicious URL to the 'ID_ADMIN' and 'SUPER_ADMIN' parameters. XSS can be exploited by sending malicious code to the 'cadena' and 'email' parameters.

Digital Security Research Group [DSecRG] Advisory #DSECRG-09-037

Attacker can inject SQL code in events_view.php vulnerable parametr eid and events_clndr_view.php vulnerable parametr id. Stored XSS vulnerability found in script blogs_full.php. Linked XSS vulnerabiliies found in groups_profile.php and adv_cat.php.

Steamcast(HTTP Request) Remote Buffer Overflow Exploit (SEH)

Steamcast is vulnerable to a remote buffer overflow exploit when a maliciously crafted HTTP request is sent to the server. This exploit uses a Structured Exception Handler (SEH) overwrite to gain control of the program flow. The exploit was discovered by Luigi Auriemma and tested on Windows XP SP2 (FR).

Recent Exploits: