header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

2daybiz B2B Portal Script Sql Injection

An attacker can exploit a SQL injection vulnerability in the 2daybiz B2B Portal Script by sending malicious SQL queries to the vulnerable parameter 'cat_id' in the URL 'www.site.com/products/business2business/selling_buy_leads1.php?cat_id=[SQLI]'. This can allow the attacker to gain access to sensitive information from the database.

ARSC Really Simple Chat V3.3 Remote File Inclsion & Cross Site Scripting Vulnerability

A Remote File Inclusion (RFI) vulnerability exists in ARSC Really Simple Chat V3.3. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary code on the vulnerable system. A Cross Site Scripting (XSS) vulnerability also exists in ARSC Really Simple Chat V3.3. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary code on the vulnerable system.

2daybiz custom T-shirt SQL Injection and Cross Site Scripting Vulnerabilities

The vulnerability exists in the products_details.php, products.php and designview.php scripts, where an attacker can inject malicious SQL queries into the vulnerable parameters sbid, pid and designid respectively.

2daybiz Matrimonial Script SQL Injection and Cross Site Scripting Vulnerabilities

2daybiz Matrimonial Script is vulnerable to SQL Injection and Cross Site Scripting. An attacker can inject malicious SQL queries into the vulnerable parameters of the application and can also inject malicious JavaScript code into the vulnerable parameters of the application.

WM Downloader 2.9.2 stack buffer overflow

WM Downloader 2.9.2 is vulnerable to a stack buffer overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted M3U file with a long URL. This will overwrite the EIP register and allow the attacker to execute arbitrary code on the vulnerable system.

Geomau 7 (.wg2) local Buffer Overflow Poc

A buffer overflow vulnerability exists in Geomau 7 (.wg2) which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the application when processing a specially crafted .wg2 file. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a malicious .wg2 file. Successful exploitation may allow execution of arbitrary code.

Big Forum 5.2v Arbitrary File Upload & Local File Inclusion Vulnerability

An arbitrary file upload vulnerability exists in Big Forum 5.2v, which allows an attacker to upload malicious files to the server. Additionally, a local file inclusion vulnerability exists, which allows an attacker to include malicious files from the server. Both vulnerabilities can be exploited by sending a specially crafted HTTP request to the vulnerable application.

phportal_1.2 (gunaysoft.php) Remote File Include Vulnerability

A remote file inclusion vulnerability exists in phportal_1.2. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. The vulnerability is due to the 'uzanti' parameter in the 'gunaysoft.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system.

Recent Exploits: