header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

com_jembed (catid) Blind SQL Injection Exploit

This exploit is used to gain access to the database of a website using the com_jembed component. It uses a blind SQL injection technique to extract the username and password of the website from the jos_users table. The exploit takes the URL of the website as an argument and then uses the length of the response to determine if the query is true or false.

Novell eDirectory 8.8 SP5 (Post Auth) Remote BOF Exploit (0day)

This exploit is a buffer overflow vulnerability in Novell eDirectory 8.8 SP5. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted request to the vulnerable server. The exploit was discovered by His0k4 & Simo36 in 2010 and affects Windows XP SP3.

flashget 3.x IEHelper remote exec 0day poc

This exploit allows a remote attacker to execute arbitrary code on a vulnerable system. The vulnerability exists in the IEHelper ActiveX control, which is used by FlashGet 3.x. By setting the 'TestObj' object's classid to a specific CLSID, an attacker can execute arbitrary code on the vulnerable system.

MobPartner Counter Remote File Upload Vulnerability

A vulnerability exists in MobPartner Counter which allows an attacker to upload a malicious file to the server. The malicious file can be uploaded by editing the shell.php.pgif file and then accessing it via the upload.php page. This can allow an attacker to gain access to the server.

VP-ASP Shopping Cart 7.0 DB Download Vulnerability

VP-ASP Shopping Cart 7.0 is vulnerable to a database download vulnerability. An attacker can download the database by accessing the URL http://127.0.0.1/vpasp/database/shopping700.mdb. The database contains user and password information in the 'tbluser' table.

PHPDug version 2.0.0 Cross Site Scripting Vulnerability

PHPDug version 2.0.0 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the 'id' parameter of the 'upcoming.php' script. This malicious code will be executed in the browser of the victim when the vulnerable page is accessed.

Recent Exploits: