header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pre Studio Business Cards Designer SQL Injection Vulnerability

Pre Studio Business Cards Designer is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Oracle DataDirect Multiple Native Wire Protocol ODBC Drivers HOST Attribute Stack Based Buffer Overflow Vulnerability

The mentioned product installs various drivers to allow the software to get informations from ODBC data sources. Some of them are vulnerable to a remote stack based buffer overflow which can be triggered by specifying an overlong HOST attribute inside the connection string. The software tries to do an unicode/ASCII conversion. In doing this, the stack is completely smashed allowing to redirect the execution flow to an user supplied buffer.

Opera Denial of Service PoC (Stack Overflow)

This exploit is a proof of concept for a denial of service vulnerability in Opera versions 11.x and below. It is triggered by a malicious JavaScript code that causes a stack overflow. The code creates a script element and appends it to the body of the page, which causes the stack overflow.

OCS Inventory NG 2.0.1 – Persistent XSS (CVE-2011-4024)

The vulnerability is in the data sent by the agent OCS. The inventory service and the admin panel does not control the data received. An attacker could inject malicous HTML/JS through into the inventory information (eg. the computer description field under WinXP). This data is printed in the admin panel wich can lead to a session hijack or whatever you want.

fims – File Management System <= 1.2.1a SQL Injection and Vulnerability

An attacker can exploit a SQL injection vulnerability in fims - File Management System <= 1.2.1a by sending a crafted request with malicious data to the application. This can allow the attacker to gain access to sensitive information stored in the database.

Uiga Personal Portal Multiple Vulnerability

Blind SQL Injection and XSS can be done using the command input on vulnerable pages such as index.php, cart.php, includes/photoview.php and index2.php. An example of the exploit is index.php?exhort=%2440-2+2*3-6&view=ar_det and cart.php/%22onmouseover=prompt(955787)%3E, includes/photoview.php/%22onmouseover=prompt(955787)%3E and index2.php/%22onmouseover=prompt(955787)%3E.

1024 CMS Version 1.1.0 beta(/complete-modules/modules/forcedownload/force_download.php) Local File Inclusion Vulnerability

1024 CMS Version 1.1.0 beta is vulnerable to a Local File Inclusion vulnerability due to a lack of proper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious filename parameter to the vulnerable application. This can allow an attacker to read sensitive files from the server, such as the boot.ini file.

WHMCompleteSolution (cart.php) Local File Disclosure

If variable "$a" has a true value, it will set "$templatefile" value by default. However, when "$a" value doesn't match the defaults values, the attacker can control "$templatefile" and use it as (File Disclosure). The attacker can use the URL http://domain.tld/[PATH]/cart.php?a=[wrong_value]&templatefile=[LFD]%00 to exploit this vulnerability.

Recent Exploits: