header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Php-Stats <= 0.1.9.1b "ip" urldecode()/ ereg() / sql injection / cleat text admin pass disclosure exploit (method ii)

This exploit allows an attacker to disclose the admin password of the Php-Stats <= 0.1.9.1b system through SQL injection. The vulnerability is caused by the lack of proper input validation in the 'ip' parameter which is passed through the urldecode() and ereg() functions. By injecting malicious SQL code, an attacker can retrieve the admin password in clear text.

Php-Stats <= 0.1.9.1b PC-REMOTE-ADDR sql injection / cleat text admin pass disclosure

This vulnerability allows an attacker to disclose the clear text admin password in Php-Stats version 0.1.9.1b and below. By exploiting the PC-REMOTE-ADDR parameter, an attacker can inject malicious SQL queries and retrieve the admin password.

Local Privilege Escalation Vulnerability in Cisco Unified Communications Manager

Attackers can exploit this issue to gain administrative access to the affected device and execute arbitrary code with superuser privileges. Successful exploits will lead to the complete compromise of the device.

Online Work Order Suite SQL Injection Vulnerability

The Online Work Order Suite is prone to an SQL injection vulnerability. This vulnerability occurs because the application fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability to manipulate the SQL queries and potentially gain unauthorized access to the application's database. This could lead to data compromise, unauthorized data modification, or exploitation of other latent vulnerabilities in the underlying database.

CA BrightStor msgeng.exe service stack overflow

Remote exploit for the CA BrightStor msgeng.exe service stack overflow vulnerability. The exploit opens a shell on TCP port 4444. The vulnerability is caused by a stack overflow in the strcpy function. The user-supplied data is stored in the heap and the first DWORD of the RPC stub is used as the source address in the strcpy operation.

Arbitrary File Upload and Cross-site Scripting Vulnerabilities in Douran Portal

The Douran Portal application fails to properly sanitize user-supplied input, leading to an arbitrary file upload vulnerability and a cross-site scripting vulnerability. Attackers can exploit these vulnerabilities to upload and execute arbitrary ASP code, steal authentication information, execute client-side scripts, and obtain sensitive information.

Recent Exploits: