header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Proof of Concept -> Mc Afee Viruscan Stack Overflow v10.0.21

The proof of concept demonstrates a stack overflow vulnerability in Mc Afee Viruscan v10.0.21. By clicking on a button, a function called GetUserRegisteredForBackend is triggered, which takes two arguments - bstrBackend and pvarAccountId. The bstrBackend argument is vulnerable to a buffer overflow, as it does not have any length check. An attacker can send a specially crafted string as input, causing the buffer to overflow and potentially execute arbitrary code. This vulnerability can be exploited to gain unauthorized access or crash the application.

Insecure File Permissions

A low privileged user can delete, modify or replace key executable files used by the Cyclope Employee Surveillance Solution software due to insecure file permissions. This can lead to unauthorized access and potential compromise of the system.

TutorialCMS <= 1.00 SQL Injection Exploit

The exploit allows an attacker to retrieve the admin username and hash by exploiting a SQL injection vulnerability in TutorialCMS version 1.00. The vulnerable code is in the 'search.php' file where the 'search' parameter is not properly sanitized and is directly used in a SQL query. By injecting a specially crafted SQL query, an attacker can retrieve the admin username and hash from the 'users' table. The exploit can be triggered by accessing the 'search.php' page with the payload: 'search=' UNION SELECT 0,0,0,0,username,password,0,0,0,0,0,0,0 FROM users WHERE id='1' /*'. It is important to note that the vulnerability can only be exploited if the 'magic_quotes_gpc' configuration is set to 'off'. The exploit also mentions that all the parameters mentioned (browseCat.php, browseSubCat.php, openTutorial.php, topFrame.php, admin/editListing.php) are also vulnerable to XSS attacks.

SimpleNews <= 1.0.0 FINAL SQL Injection Exploit

This exploit allows an attacker to retrieve the admin username and hash from the SimpleNews <= 1.0.0 FINAL system. The vulnerability is caused by a lack of input validation in the 'news_id' parameter of the 'print.php' script. By injecting a specially crafted SQL query, an attacker can retrieve sensitive information from the database.

telltarget CMS 1.3.3 <= Multiple Remote File Inclusion Vulnerabilitie

The telltarget CMS 1.3.3 version is vulnerable to multiple remote file inclusion vulnerabilities. Attackers can exploit these vulnerabilities by injecting malicious code into certain PHP scripts, allowing them to include and execute arbitrary files from remote servers. The specific vulnerable paths include /phplib/site_conf.php, /phplib/version/1.3.3/functionen/class.csv.php, /phplib/version/1.3.3/functionen/produkte_nach_serie.php, /phplib/version/1.3.3/functionen/ref_kd_rubrik.php, /phplib/version/1.3.3/module/hg_referenz_jobgalerie.php, /phplib/version/1.3.3/module/surfer_anmeldung_NWL.php, /phplib/version/1.3.3/module/produkte_nach_serie_alle.php, /phplib/version/1.3.3/module/surfer_aendern.php, /phplib/version/1.3.3/module/ref_kd_rubrik.php, /phplib/version/1.3.3/module/referenz.php, /phplib/version/1.3.3/standard/1/lay.php, /phplib/version/1.3.3/standard/3/lay.php. These vulnerabilities can be exploited by an attacker to execute arbitrary code and potentially gain unauthorized access to the affected system.

Recent Exploits: