header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

eshtery CMS Sql Injection Vulnerability

For successful injection in this CMS, an attacker has to pass two steps. In the first step, the attacker has to enter a value in the Criteria field and click on the 'Go' button. If the data is loaded, the attacker can enter a value to define the first character of the AccName field of the Admins table. If the first character is 'a', the data will be loaded. If not, nothing will be loaded. The attacker can repeat this process to acquire the other characters and extract the admin's username and password.

MyHobbySite 1.01 SQL injection, Bypass Authentication Vulnerability

MyHobbySite 1.01 is vulnerable to SQL injection and authentication bypass. An attacker can exploit this vulnerability by entering malicious SQL queries in the username and password fields. This can be done by entering ' union select 1,concat_ws(0x3a,id,username,password,email),3,4,5 from mhs_users-- - in the username and password fields or by entering ' or 1=1-- - in the username and password fields. This vulnerability can only be exploited when magic_quote_gpc is set to Off.

[DCA-00015]

In function http_parse_request_header the application fails to do a boundary check for a malformed buffer received as a HTTP command (HEAD/GET/POST), prior to use it as input for logger variable at swebs_record_log function. The exploit sends a malformed buffer as a HTTP command (HEAD/GET/POST) to the vulnerable application.

HP Data Protector Media Operations 6.11 Multiple NULL Pointer Dereference Local DoS (0day)

DBServer.exe and DBTools.exe are prone to local denial of service causing a NULL pointer Dereference. Correct manipulation of .4DC file format should to allow attackers exploit this issue to crash application, denying service to legitimate users. Due to the nature of this issue, attackers may be able to execute local arbitrary code, but this has not been confirmed.

Microsoft Office Word sprmCMajority buffer overflow

This exploit is a buffer overflow vulnerability in Microsoft Office Word 2007 SP2. It is triggered when a specially crafted Word document is opened. The vulnerability is caused by a lack of proper bounds checking of the sprmCMajority and sprmPAnld80 fields in the Word document. This can allow an attacker to execute arbitrary code on the target system.

Symphony 2.0.7 Multiple Vulnerabilities

The POST variable send-email[recipient] is vulnerable in /symphony-2.0.7/about/ and the POST variable fields[website] is vulnerable in /symphony-2.0.7/articles/a-primer-to-symphony-2s-default-theme/. The POST variable send-email[recipient] is vulnerable in /symphony-2.0.7/about/ and the POST variable fields[website] is vulnerable in /symphony-2.0.7/articles/a-primer-to-symphony-2s-default-theme/.

Recent Exploits: