header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

poc-exploit.c for CVE-2018-14634

poc-exploit.c is a proof-of-concept exploit for CVE-2018-14634, a buffer overflow vulnerability in the Linux kernel. The exploit uses a combination of environment variables and memory mapping to create a buffer overflow in the kernel. The exploit is capable of creating a buffer of up to 2^31 bytes, which can be used to overwrite kernel memory and potentially gain root privileges.

Flippa Marketplace Clone 1.0 – ‘date_started’ SQL Injection

Flippa Marketplace Clone 1.0 is vulnerable to SQL Injection. An attacker can inject malicious SQL queries via the 'date_started' and 'sortDir' parameters in the 'site-search' script. This can be exploited to read, modify or delete data from the database.

Binary MLM Software 1.0 – ‘pid’ SQL Injection

An unauthenticated attacker can inject arbitrary SQL commands via the 'pid' parameter in the 'tree.php' script. By exploiting this vulnerability malicious users can compromise the application, access or modify sensitive data, exploit various SQL injection techniques such as SQL union and boolean-based blind, and execute arbitrary system commands.

Singleleg MLM Software 1.0 – ‘msg_id’ SQL Injection

Singleleg MLM Software 1.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to access or modify data in the back-end database, compromise the application, access or elevate privileges, or exploit latent vulnerabilities in the underlying database implementation.

Education Website 1.0 – ‘subject’ SQL Injection

A SQL injection vulnerability exists in Education Website 1.0, which allows an attacker to execute arbitrary SQL commands via the 'subject' and 'city' parameters in college_list.html. An attacker can use the 'UNION' operator to inject malicious SQL code into the application, which can be used to extract data from the database.

Exploit Title: Hotel Booking Engine 1.0 – ‘h_room_type’ SQL Injection

A SQL injection vulnerability exists in Hotel Booking Engine 1.0, which allows an attacker to execute arbitrary SQL commands via the 'h_room_type' and 'destination' parameters. An attacker can use this vulnerability to gain access to sensitive information from the database, such as user credentials, or to modify data.

Recent Exploits: