header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SmodCMS <= 2.10 (Slownik ssid) Remote SQL Injection Exploit

This exploit allows an attacker to perform a remote SQL injection attack on SmodCMS version 2.10 or below. The vulnerability is located in the 'slownik_module_id' parameter. An attacker can execute arbitrary SQL queries, which can lead to unauthorized access to the database or manipulation of data.

WordPress Ajax Store Locator <= 1.2 SQL Injection Vulnerability

The 'sl_dal_searchlocation_cbf' ajax function in Wordpress Ajax Store Locator plugin version 1.2 and below is affected by a SQL Injection vulnerability. The 'StoreLocation' variable is not sanitized, allowing an attacker to inject malicious SQL queries.

Beryo 2.0(downloadpic.php chemin)Remote File Disclosure Vulnerability

The Beryo 2.0 version contains a vulnerability that allows remote attackers to disclose files from the server. By manipulating the 'chemin' parameter in the 'downloadpic.php' script, an attacker can traverse the directory structure and access sensitive files such as the password file ('/etc/passwd'). The vulnerability can be exploited by sending a crafted request to the server with the appropriate path traversal sequence in the parameter value.

FileCOPA FTP Server <= 1.01 (LIST) Remote Buffer Overflow Exploit(2)

We can write some assembly instruction to jump into shellcode. At the time of EIP overwrite, ECX points to our hole request(LIST evil). So jumping forward into ECX points to our Shellcode.

Wserve HTTP Server 4.6 Version (Long Directory Name) Buffer Overflow – Denial Of Service

This exploit is for the Wserve HTTP Server 4.6 version which is vulnerable to a buffer overflow attack. The attacker sends a specially crafted HTTP request with a long directory name, causing a buffer overrun. This results in a denial of service as the program's internal state gets corrupted and it cannot continue execution safely.

WebSPELL <= 4.01.02 (picture.php) Remote File Disclosure Vulnerability

This vulnerability allows an attacker to remotely disclose files on the target system. It works independently from PHP version but depends on PHP option register_globals (= on) or PHP versions (< 4.3.0). The exploit can be triggered by accessing the picture.php file with specific parameters.

XOOPS Module Jobs <= 2.4 (cid) Remote BLIND SQL Injection Exploit

This exploit allows an attacker to perform a blind SQL injection attack on the XOOPS Module Jobs <= 2.4. By manipulating the 'cid' parameter in the index.php file, an attacker can retrieve sensitive information from the database, including the usernames and passwords of the admin users.

Recent Exploits: