header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ccTiddly v1.7.6 Multiple Remote File Inclusion Vulnerability

ccTiddly is a collaborative server side version of TiddlyWiki. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'cct_base' parameter in the 'include.php' and 'workspace.php' scripts. A remote attacker can exploit this vulnerability to include arbitrary files from remote locations and execute arbitrary PHP code on the vulnerable system.

APBoard 2.1.0 / board.php?id= SQL Injection

APBoard 2.1.0 / board.php?id= SQL Injection is a vulnerability that allows an attacker to inject malicious SQL code into a vulnerable web application. This can be exploited to gain access to sensitive data stored in the database, or to modify the data stored in the database. The vulnerability is present in versions 2.1.0 and earlier of APBoard. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable web application, containing malicious SQL code. The malicious code is then executed by the web application, allowing the attacker to gain access to sensitive data or modify the data stored in the database.

sX-Shop / view_image.php SQL Injection

Discovered by secret, sX-Shop / view_image.php SQL Injection vulnerability can be exploited by sending a malicious SQL query to the vulnerable parameter 'id' in view_image.php. An attacker can use this vulnerability to gain access to the database and execute arbitrary code.

Mediamonkey v. 3.2.1.1297 DOS POC

This exploit is a proof of concept for a Denial of Service (DoS) vulnerability in Mediamonkey v. 3.2.1.1297. The vulnerability is triggered when a specially crafted MP3 file is opened, causing the application to crash. The vulnerable application can be found at http://www.mediamonkey.com/trialpay and the exploit has been tested on Windows XP SP2/3.

FathFTP 1.8 (SEH) FileExists ActiveX Buffer Overflow

A buffer overflow vulnerability exists in FathFTP 1.8 ActiveX control when handling the FileExists method. An attacker can exploit this vulnerability to execute arbitrary code by sending a specially crafted request containing an overly long string to the vulnerable method. This can be exploited to execute arbitrary code by sending a specially crafted request containing an overly long string to the vulnerable method.

Easy RM to MP3 2.7.3.700 Local Buffer Overflow (.m3u , .pls , .smi , .wpl , .wax , .wvx , .ram)

This exploit works for all the file extensions mentioned above. The user just needs to change the file extension below with the extension mentioned above. 35032 bytes are needed before overwriting EIP register. JMP ESP in SHELL32.DLL is used to bind a shell at TCP Port 5555 (Telnet to this port after exploiting target).

Progitek Visionner Photos v2.0 – File Format DOS

This exploit is a buffer overflow vulnerability in Progitek Visionner Photos v2.0. The exploit is triggered when a specially crafted JPG file is opened in the application. The file contains a large amount of data which causes a buffer overflow, allowing an attacker to execute arbitrary code on the vulnerable system. The exploit is written in Perl and creates a malicious JPG file which contains a large amount of data, causing the buffer overflow.

WordPress NextGEN Smooth Gallery BLIND SQL injection

WordPress NextGEN Smooth Gallery plugin version 1.2 or lower is vulnerable to a Blind SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to sensitive information stored in the database.

Recent Exploits: