header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Simple File Lister module <= 1.0 Directory Traversal Vulnerability

The vulnerability exists due to insufficient sanitization of the variable $sfl_dirlocation which contains the directory to be read. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. To look for a valid url, just sniff the HTTP request sent from the module javascript code once a directory is clicked.

JCE Joomla Extension <=2.0.10 Multiple Vulnerabilities

JCE is an extension for Joomla!, that provides you with a set of wysiwyg editor tools that makes the job of writing articles for your Joomla! site a little bit easier. Path Traversal in 'Image Manager', 'Media Manager', 'Template Manager' and 'File Manager' section. Attackers can delete any file or upload files to all the directories of the server. Attackers can use unsafe function called 'folderRename' for changing Image type extension (.jpg, .gif, .png & etc.) to any extension like .htaccess or .php in 'Image Manager', 'Media Manager', 'Template Manager' and 'File Manager' section.

Ferdows CMS Pro <=1.1.0 Multiple Vulnerabilities

Ferdows CMS is a complete, fully featured CMS in ASP.NET language and using AJAX technology with MSSQL and became a powerful CMS having plenty of strong modules. This CMS is not open-source and is accessible for private use by the author company for designing their customer's websites. Injection Flaws include Blind SQL Injection in "/about.aspx" and "/archive.aspx" and "/default1.aspx" in "siteid" parameter. Cross Site Scripting (XSS) includes Reflected XSS attack in "/showdata.aspx" in "dataid" parameter. (Post Method)

WordPress oQey Headers plugin <= 0.3 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'img_header_id' parameter of the 'oqey_settings.php' script. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in the application's database, cause denial of service or access sensitive data.

WordPress Collision Testimonials plugin <= 3.0 SQL Injection Vulnerability

The WordPress Collision Testimonials plugin version 3.0 and below is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The crafted request contains a malicious SQL query in the 'id' parameter of the 'featQuote' parameter. This can allow an attacker to execute arbitrary SQL commands on the vulnerable server.

WordPress MM Forms Community plugin <= 1.2.3 SQL Injection Vulnerability

The WordPress MM Forms Community plugin version 1.2.3 is vulnerable to a SQL injection attack. This attack is possible when the magic_quotes setting is turned off. An attacker can exploit this vulnerability by sending a crafted HTTP request to the edit_details.php script with a malicious ID parameter. This will allow the attacker to execute arbitrary SQL commands on the underlying database.

Sunway Force Control SCADA httpsvr.exe Exploit

Sunway Force Control SCADA httpsvr.exe is vulnerable to a SEH Overwrite vulnerability. This exploit was tested on Windows XP SP0 English and probably will work on XP SP3 if a none-safeseh dll for p/p/r pointer is found. The exploit uses a windows/exec CMD=calc.exe shellcode and a NOP sled to achieve code execution.

WordPress Photoracer plugin <= 1.0 SQL Injection Vulnerability

The WordPress Photoracer plugin version 1.0 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request to the viewimg.php script with a malicious 'id' parameter. This will allow the attacker to execute arbitrary SQL queries on the underlying database.

Recent Exploits: