header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_agency SQL Injection Vulnerability

The vulnerability exists in the 'com_agency' component of Joomla. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'aid' in the 'view' task of the component. An example of the exploit is http://127.0.0.1/index.php?option=com_agency&task=view&aid=-1 UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14

Multi Auktions Komplett System V2 <= Blind SQL Injection Exploit

This exploit is used to gain access to the password of a user in the Multi Auktions Komplett System V2. It is done by exploiting a vulnerability in the http://www.site.com/multiauktionV3/auktion_text.php?id_auk= URL. The exploit uses a loop to iterate through the characters of the password and then uses the ascii() function to compare the characters of the password with the characters of the URL. If the characters match, the password is revealed.

Mini-stream Ripper 3.1.0.8 => Local stack overflow exploit

Mini-stream Ripper 3.1.0.8 is vulnerable to a local stack overflow vulnerability. By sending a specially crafted .smi file, an attacker can overwrite the return address of the stack and execute arbitrary code. The exploit code contains a shellcode that spawns a shell on port 4444.

Uebimiau Webmail <= 2.7.2 Multiple Vulnerabilities

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. Directory Listing enables the attacker to view the directory structure of the web application. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file.

Simple Machines Forum <= 1.1.8 (avatar) Remote PHP File Execute PoC

This vulnerability allows an attacker to execute a malicious PHP file in any visitor of the forum. The scope of the attack depends on the strength of the PHP file. The attacker can create a new topic with the malicious file URL as the avatar, and any visitor of the topic will be infected.

Recent Exploits: