header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Internet Explorer VML Remote Buffer Overflow (Windows XP SP2)

This exploit is modified from Shirkdog's PoC and exploits the stack-based buffer overflow in the different manner using heap spraying technique to injection shellcode in the heap. This exploit tested on Windows XP SP2 + IE6 SP1, Windows XP SP1 + IE6 SP1, Windows XP SP0 + IE6, Windows 2000 SP4 + IE6 SP1 and Windows 2000 SP4 + IE6.

Remote File Include in syntaxCMS

A Remote File Include vulnerability exists in syntaxCMS due to the inclusion of user-supplied input in the '0004_init_urls.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the 'init_path' parameter, which will be included in the vulnerable script. This can allow an attacker to execute arbitrary code on the vulnerable system.

iyzi Forum s1 b2 (tr) SQL Injection Vulnerability

An SQL injection vulnerability exists in iyzi Forum s1 b2 (tr) due to improper sanitization of user-supplied input to the 'uye_ayrinti.asp' script. An attacker can exploit this vulnerability to gain access to the application's database and execute arbitrary SQL commands. The password is encrypted with SHA-256.

AdVancedClanscript Remote File Inclusion Vulnerability

AdVancedClanscript version 3.4 and below is vulnerable to a Remote File Inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'content' parameter of the 'mcf.php' script. This may allow a remote attacker to include a file from a remote host that contains arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access.

SpideyBlog 1.5 Sql Injection Exploit

SpideyBlog 1.5 is vulnerable to a SQL injection vulnerability. This vulnerability allows an attacker to gain access to the administrator's username and password. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application. The exploit code is written in Perl and is available on milw0rm.com.

ToXiC

A remote file inclusion vulnerability exists in ZoomStats, due to the $GLOBALS['lib']['db']['path'] array not being declared. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the GLOBALS['lib']['db']['path'] parameter to the vulnerable page, mysql.php, located in the /libs/dbmax/ directory.

xweblog <= 2.1 (tr) (kategori.asp)Remote SQL Injection Vulnerability

xweblog <= 2.1 (tr) (kategori.asp) is vulnerable to a Remote SQL Injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, such as usernames and passwords.

Wili-CMS Multiple Input Validation Vulnerabilities

Wili-CMS is vulnerable to multiple input validation vulnerabilities. These vulnerabilities include remote include, XSS, and full path disclosure. An attacker can exploit these vulnerabilities to gain access to sensitive information, execute arbitrary code, and gain access to the underlying system.

Recent Exploits: