header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Follower User MyBB plugin SQL Injection 0day

The vulnerability exists within SuscribeUsers.php on SuscribeUsers_add() where the user input is not properly sanitized. An attacker can inject malicious SQL code into the 'usid' and 'uid' parameters of the 'misc.php' page. An example of the malicious URL is '/misc.php?suscriberuser=yes&usid='[SQLi]--+-&uid=[Your_User_ID]'. This can be used to gain access to the database and potentially execute arbitrary code.

Joomla com_spidercatalog SQL injection Vulnerability

Spider Catalog for Joomla! is a convenient tool for organizing the products represented on your website into catalogs. It is possible to add an unlimited number of parameters for each of the categories in the catalog in order to allow a detailed representation of the product on the catalog. Moreover, each product on the catalog can be accompanied with an image. Customers are provided with the possibility of rating the products available on the catalog, as well as writing customer reviews that will appear under the catalog products. Spider Catalog provides you with a high level of customization concerning almost all the aspects of the catalog, ranging from background colors and text size inside the product cell to the number of products in the row and the number of customer reviews per catalog page. The vulnerability is caused due to the improper sanitization of user-supplied input in the 'product_id' parameter of the 'index.php' script when handling a querystring.

Internet Explorer 9 Memory Corruption PoC Exploit

This PoC exploit successfully executes with IE9 version 9.0.8112.16421 and is discovered by Jean Pascal Pereira. The exploit creates a junk.htm file with a string of 24117256 NOP instructions and an iframe with the junk.htm file. The exploit also creates 60 hidden iframes with the junk.htm file.

Invision Power Board <= 3.3.4 "unserialize()" PHP Code Execution

Invision Power Board is vulnerable to a PHP Object Injection vulnerability due to the lack of proper sanitization of user input passed through cookies. An attacker can exploit this vulnerability to execute arbitrary PHP code via the "__destruct()" method of a maliciously crafted object.

SIEMENS Sipass Integrated 2.6 Ethernet Bus Arbitrary Pointer Dereference

The vulnerability exists within AscoServer.exe during the handling of RPC messages over the Ethernet Bus. Insufficient sanity checking allows remote and unauthenticated attackers to corrupt a Heap-Allocated Structure and then dereference an arbitrary pointer. This flaw allows remote attackers to execute arbitrary code on the target system, under the context of the SYSTEM account, where the vulnerable versions of SIEMENS SiPass Integrated are installed. More advanced payloads could modify the behavior of the application’s internal controllers to unlock doors, control specific hardware, or expose businesses to other security risks.

WordPress plugins – bbpress Multiple Vulnerabilities

bbpress plugin is prone to an SQL injection Vulnerability. In cases when you face a valid string column problem try to change syntax or instead spaces add /**/. The Full Path Disclosure vulnerability in bbpress is via Array. Directory Listing Vulnerability can be exploited by accessing the bb-templates directory.

PG Dating Pro v1.0 CMS – Multiple Web Vulnerabilities

Professional online dating script is a basis for a successful online dating, community and personals business. Dating Pro is readymade PHP online dating software for everyone. Our dating web site software can be used to create your own dating, personals, social dating, adult & matrimonial sites. Flexible source codes and fully equipped dating software package makes a vivid site for your community.

VaM Shop Vulnerability

Blind SQL injection in shopping_cart.php in parameter product_id[]. PoC: POST /shopping_cart.php?action=update_product cart_delete[]=2071&cart_quantity[]=1&old_qty[]=1&products_id[]=2071' and sleep(2)%3d%27. Multiple XSS(cross-site scripting). PoC: /advanced_search_result.php/o" onmouseover=prompt(123) //

Recent Exploits: