header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

seagull-0.6.7 SQLinjection Vulnerabilitie

A SQL injection vulnerability exists in seagull-0.6.7 and lesser versions. An attacker can send a specially crafted HTTP request to the vulnerable application to exploit this vulnerability. The POST variable frmQuestion has been set to 1' and the POC is http://server/index.php/user/password/?action=retrieve&frmEmail=111-222-1933email@address.tst&frmQuestion=1'[SQLI]&frmAnswer=111-222-1933email@address.tst&submitted=retrieve

CF Image Hosting Script Remote File Inclusion

A remote file inclusion vulnerability exists in CF Image Hosting Script version 1.3.8. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path to the vulnerable application. This can allow an attacker to execute arbitrary code on the vulnerable system.

Multi-lingual E-Commerce System 0.2 Multiple Remote File Inclusion Vulnerabilities

Multiple Remote File Inclusion (RFI) vulnerabilities have been discovered in Multi-lingual E-Commerce System 0.2. An attacker can exploit these vulnerabilities by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the vulnerable server.

vBulletin 3.8.4 & 3.8.5 Registration Bypass Vulnerability

Go to Http://[localhost]/path/register.php, assume that forum admin user name is ADMIN, type this at User Name ===> ADMIN&#00, &#00 is an ASCII Code, and complete the other parameters, then click on Complete Registrarion, now you see that your user name like admin user name, after this time the private messages to the user (ADMIN) to sending see for you is sending.

SnackAmp 3.1.2 Malicious SMP Buffer Overflow Vulnerability (SEH)

SnackAmp 3.1.2 is vulnerable to a malicious SMP buffer overflow vulnerability. By sending a specially crafted SMP file, an attacker can overwrite the SEH and execute arbitrary code. The exploit code is written in Ruby and contains a payload of 144 bytes that executes the calc.exe program. The payload is encoded using the x86/shikata_ga_nai encoder.

nginx heap corruption

This exploit is for nginx versions <= 0.6.38 and <= 0.7.61. It is written and tested against BT4, an intel x86 setup. The exploit requires knowledge of the offset and pad to gain control of execution flow. To verify the exploit, launch nginx, attach GDB to the worker and target it with the exploit, setting the offset to 0. When the worker gets a sigsegv, it will be on a line which looks like 'if (ctx->offset)', at that point type 'p *r'. In the r data structure will be a few different fields, one which is a buffer that contains 'GET //../Aa0'. Add 131 to the pointer value of that buffer and set the last octet to 00.

CF Image Hosting script 1.3 (settings.cdb) Information Disclosure Vulnerability

A vulnerability in the CF Image Hosting script version 1.3 allows an attacker to view the settings.cdb file which contains sensitive information such as the database username and password. This vulnerability is due to the fact that the settings.cdb file is stored in the upload/data directory which is accessible to the public.

Recent Exploits: