header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Shop Script Pro 2.12 SQL Injection Exploit

The Shop Script Pro 2.12 application is vulnerable to SQL injection. The vulnerability exists in the 'index.php' file at line 101, where the '$current_currency' variable is set from the unfiltered value of the '$_SESSION["current_currency"]' variable. An attacker can exploit this vulnerability to upload a malicious shell script by sending a POST request with a SQL injection payload. This allows the attacker to execute arbitrary code on the server.

SAP GUI for Windows Buffer Overflow Vulnerability

SAP GUI for Windows version 6.4 contains an ActiveX component called SAPIrRfc which is vulnerable to a buffer overflow attack. An attacker can construct an HTML page that calls the vulnerable function 'Accept' from the ActiveX Object SAPIrRfc with a long parameter. When a user opens this page, it can lead to a denial of service (DoS) or full remote control of the target system. An example of a DoS attack is provided in the advisory.

Omilen Photo Gallery Beta 0.5 – Local File Inclusion

The Omilen Photo Gallery Beta 0.5 script is vulnerable to Local File Inclusion (LFI) attack. An attacker can exploit this vulnerability by manipulating the 'controller' parameter in the 'index.php?option=com_omphotogallery' URL, allowing them to include arbitrary files from the server.

Recent Exploits: