header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[L.F.I]STACK version 1.1[L.F.I]

This exploit allows an attacker to read sensitive files on the server by exploiting a Local File Inclusion (LFI) vulnerability in STACK version 1.1. The vulnerability exists due to insufficient sanitization of user-supplied input in the "action" parameter of the "documentation.php" script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. "/../") and a null byte (%00) to the vulnerable script. This will allow the attacker to read sensitive files on the server, such as the "/etc/passwd" file.

PowieSys <= 0.7.7 alpha index.php (shownews) SQL Injection Vulnerability

The vulnerability exists in the 'index.php?shownews=' parameter of the PowieSys <= 0.7.7 alpha script. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious payload to the vulnerable parameter. This can allow the attacker to execute arbitrary SQL queries on the underlying database, potentially leading to the disclosure of sensitive information.

Uiga Fan Club SQL Injection Vulnerability

A SQL injection vulnerability exists in Uiga Fan Club, which allows an attacker to execute arbitrary SQL commands on the underlying database. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The vulnerable parameter is ‘id’, which is not properly sanitized before being used in a SQL query. This can be exploited to inject arbitrary SQL commands which can be used to bypass authentication, access, modify or delete data.

CMS Openpage (index.php) SQL Injection Vulnerability

CMS Openpage is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'index.php?pagina=news&id='. This can allow the attacker to gain access to the database and extract sensitive information such as usernames, passwords, and emails.

Mini CMS RibaFS 1.0 (Auth Bypass) SQL Injection Vulnerability

Mini CMS RibaFS 1.0 is vulnerable to an authentication bypass vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. The vulnerability exists in the login.php file, where the application does not properly sanitize user-supplied input before using it in an SQL query. This can be exploited to inject arbitrary SQL code and bypass authentication.

Kenward zipper v1.4 0day Stack Buffer Overflow PoC exploit

Kenward zipper is vulnerable to a stack buffer overflow vulnerability. The vulnerability is caused due to a boundary error when handling a specially crafted ZIP file. This can be exploited to cause a stack-based buffer overflow by e.g. enticing a user to open a specially crafted ZIP file. Successful exploitation may allow execution of arbitrary code.

4x cms <= r26 (Auth Bypass) SQL Injection Vulnerability

4x cms <= r26 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. The PoC for this vulnerability is to use ' or '1=1 as the username and password when logging in.

Recent Exploits: