Concrete CMS version 5.5 suffers from shell upload and denial of service vulnerabilities.
6ec38ad9d2006135e28b4b0fb7f180db578fa58f67aac5af3c4a62bcf7e28a38
The Joomla Video Gallery component suffers from local file inclusion and remote SQL injection vulnerabilities.
462e3a42ad4cdf7f3d4b4fc799263665b5f88d737088527e7db190630d754023
PG-MailingList versions 3.0 and below suffer from a cross site scripting vulnerability.
a9e87d839e6fb56045cb70c7be7d2d1eef1cacb23d8f5c04a3ad122dffc4131b
GetSimple version 3.1 suffers from backup download and shell upload vulnerabilities.
6d7e6bb2dc03c8ee708abf9ebd0c5acdb49191acb3f9a1b447a52889d00c3574
Havalite CMS suffers from database disclosure, shell upload, and remote SQL injection vulnerabilities.
5333f13c7d3a31da5790853e3d445f2ca1d0412733313afc050cc63a50eeae64
AlegroCart FCKEditor remote command execution proof of concept exploit that leverages the vulnerability found by T0x!c.
171191b6b9e949736304584375831cd8fde697a49bae29a16126d5d68d7ed190
Log1cms version 2.1 suffers from cross site request forgery vulnerabilities that allow for shell upload and file downloads.
fc139e44abe15975ea6625bf46ebf7ec02a9bb3d4a76dce8e812d83c5f4d9870
BrewBlogger version 2.3.2 suffers from cross site request forgery, shell upload, and remote SQL injection vulnerabilities.
674b26c64d971b9a144e02536d38c471153b34e1b24f8b7e3dc3d6f7ef29a66b
62 bytes small Linux/x86 BackShell-TCP bash[/dev/tcp],execve(/bin/sh) shellcode.
c11501f06303b67afdaf120cb4cec86433c1a1f77db9fe89aaa1c8245ba1b310
The Joomla Xcomp component suffers from a local file inclusion vulnerability.
cd1de8eea256d03c454e980399eb3314f2b099fd3ff8b51f4574ff1088120184
This tool is a php script that assists in finding vulnerable components in multiple CMS systems.
4d2492d8c0103eb62eed2ed37137e6e97badf00162448c9f8015bfeea67e820e
The Joomla X-Shop component suffers from a remote SQL injection vulnerability.
2a1da2cb26bbc9872537f3fcc9e301d5065173529e8cc82639b4990c4e7ae4ba
The Joomla XVS component suffers from a local file inclusion vulnerability.
83568394e1e0d7765b6bb3a1a88a20af2661418d31092da6211c6739a9693a83
PBBoard version 2.1.4 suffers from cross site request forgery and shell upload vulnerabilities.
946654f6c8dd861146b9ddc6cf5fb73b914cc93a514ecefb8258d78cc607a72e
Razor CMS version 1.2 suffers from multiple file disclosure vulnerabilities.
7cd6078d125aa0f12edee9ff504009e2443d528c8aefd4bf33e2f2c61b2088fd
97 bytes small OS X / x86 shellcode that binds a shell to port 4444.
623642c76b21d9c8b8565f08b67486e7985cda73e2d5e7e4e1a112dc36fa3cee
180 bytes small Linux/x86 add new user/password shellcode.
2507665fb5598085aa7170024022a8af2b3c254563abca1ee43b028cda2e1de8
This Metasploit module exploits a stack buffer overflow in versions 2.112 of UltraPlayer by creating a specially crafted .m3u file. The file allows an attacker to execute arbitrary code.
ca1fcc7a152abea97e8cfb96078845d146070280b9ea0f1eac09f15ddad9d831
This Metasploit module exploits a buffer overflow in Microsoft Office 2003 and command execution with .a malicious doc file .
e45bf18ac108e4ae3783ccae6f6292790febfb3111809b9cea39d7aae1a9bdb6
This Linux/x86 shellcode searches .php files and injects a PHP backdoor into them.
083be87460a5024c26d79b3f9143ff66d4099a6b438b7ea88f793822bed39c10
UltraPlayer version 2.112 stack buffer overflow exploit that creates a malicious .m3u file that will trigger a reverse shell.
96294503f8bfddc167c2244a8894cb4cb8d4325bf34e9db7b30dd6d1cc1a5420
UltraPlayer version 2.112 local crash exploit that creates a malicious .avi file.
9f43265703ad1b56d80101b2fa1124c6d41e5f3b00ba5fb5e1b81d34b128b091
glFusion CMS version 1.2.2 suffers from shell upload and remote SQL injection vulnerabilities.
ad6bb126a05811ea0372f50995944d0c7147bd0aaab64e41a724c0997e704a2d
94 bytes small BSD/x86 execve ('/bin/sh -c "/etc/master.passwd"') setreuid(0,0) shellcode.
fa8695efffe51e32d85a7add93904eb75c24cf151a45133bc12107cd8d25c95f
This Metasploit module exploits a stack buffer overflow in GOM Player version 2.1.33 by creating a specially crafted .asx file which will allow an attacker to execute arbitrary code.
b3d6b213896bb1a0f9594f5b388cc6189527081d4b00c1e99a39ed41e41f07f9