header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component user_id com_sqlreport Blind SQL Injection Vulnerability

This exploit is a blind SQL injection vulnerability in the Joomla Component user_id com_sqlreport. It allows an attacker to inject malicious SQL code into the vulnerable application and execute it. The exploit uses a Perl script to send a malicious request to the vulnerable application and extract the results. The script can be used to extract data from the database, such as usernames and passwords.

Top Auktion SQL Injection news.php

A SQL injection vulnerability exists in the Top Auktion web application. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The request contains malicious SQL statements that are executed in the backend database. The malicious SQL statement can be used to extract sensitive information from the database, such as user credentials, or to modify the data stored in the database.

Php Auktion Pro SQL Injection news.php

A SQL injection vulnerability exists in the Php Auktion Pro script. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application with the malicious payload in the 'id' parameter. The malicious payload can be either 'null+union+select+1,2,convert (password using utf8),4,5+from+users#' or 'null+union+select+1,2,concat (name,0x3a,password),4,5+from+users#'

iPhone – FTP Server (WiFi FTP) by SavySoda DoS/PoC

The server doesn't crash at all, but after exploiting it, you can't see (list) your files anymore. You must to close the app and open it again. Then you'll see that the app starts like it was fresh installed and your files are gone.

Joomla com_ice Remote Blind Injection Vulnerability

This exploit is a blind SQL injection vulnerability in Joomla's com_ice component. It allows an attacker to extract usernames and passwords from the Joomla database. The exploit works by sending a series of requests to the vulnerable URL, each of which contains a different SQL query. The response time of the server is then used to determine the result of the query.

Softbiz Jobs CSRF Vulnerability

Softbiz Jobs is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can exploit this vulnerability by crafting a malicious HTML page that contains an image tag with a specially crafted URL. When a logged-in administrator visits the malicious page, the URL will be executed in the context of the administrator's session, allowing the attacker to delete the registered user.

Easy FTP Server 1.7.0.2 Remote BoF

Easy FTP Server 1.7.0.2 is vulnerable to a buffer overflow attack. The vulnerability exists in the CWD command, which allows an attacker to send a malicious payload of 272 bytes. The payload contains a NOP sled followed by a shellcode and a return address. The shellcode executes calc.exe on the target machine. The vulnerability was discovered by athleet and was tested on Windows XP SP3 (Eng).

Chasys Media Player 1.1 (.mid) Local Buffer Overflow

Chasys Media Player 1.1 is vulnerable to a local buffer overflow vulnerability when processing .mid files. An attacker can exploit this vulnerability by crafting a malicious .mid file and sending it to the target system. When the target system opens the malicious .mid file, the attacker can execute arbitrary code on the target system.

Recent Exploits: