header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability exists in the Calc Builder component of Joomla. An attacker can send a specially crafted request to the vulnerable application in order to extract sensitive information from the database. The vulnerable parameter is the ‘id’ parameter which can be manipulated to inject malicious SQL queries. An example of a malicious request is ‘option=com_calcbuilder&controller=calcbuilder&format=raw&id=3 and+1=1&fld_5=C’.

A Cool Debate 1.0.3 Component Joomla Local File Inclusion

Some Local File inclusion vulnerabilities exist in Component A Cool Debate 1.0.3. The vulnerability is in the line: require_once $path; The variable $path is not sanitized and can be manipulated to include local files. An attacker can include local files and execute arbitrary code on the server.

MS11-050 IE mshtml!CObjectElement Use After Free

This module exploits a use-after-free vulnerability in Internet Explorer. The vulnerability occurs when an invalid <object> tag exists and other elements overlap/cover where the object tag should be when rendered (due to their styles/positioning). The mshtml!CObjectElement is then freed from memory because it is invalid. However, the mshtml!CDisplay object for the page continues to keep a reference to the freed <object> and attempts to call a function on it, leading to the use-after-free.

persistent XSS through SQLi WeBid 1.0.2

An attacker could inject malicious HTML/JS through a SQL injection flow in the adsearch.php. The SQL injection flaw exists in the 'maxprice' field. The SQL injection attack cannot be elevated, so the attacker leverages the SQL injection to trigger an error that would write the malicious HTML/JS to the error log. The XSS attack happens when the admin or any user capable of viewing the error log from the ACP.

Catalog Builder – Ecommerce Software – Blind SQL Injection Vulnerability

Catalog Builder is vulnerable to Blind SQL Injection. The vulnerability exists in the 'cat_id' parameter of the 'main.php' script. An attacker can inject malicious SQL queries in the 'cat_id' parameter and execute them in the backend database. This can be exploited to gain access to sensitive information from the database.

Adobe Reader/Acrobat Memory Corruption Denial of Service

A vulnerability in Adobe Reader/Acrobat could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to a memory corruption issue when processing a specially crafted PDF file. An attacker could exploit this vulnerability by convincing a user to open a malicious PDF file. Successful exploitation could result in a DoS condition.

IBM WebSphere Application Server Cross-Site Request Forgery

WebSphere is IBM's integration software platform. It includes the entire middleware infrastructure --such as servers, services, and tools-- needed to write, run, and monitor 24x7 industrial-strength, on demand Web applications and cross-platform, cross-product solutions. WebSphere Application Server is the base for the infrastructure; everything else runs on top of it. The administrative console of IBM WebSphere Application Server is vulnerable to Cross-Site Request Forgery (CSRF) attacks, which can be exploited by remote attackers to force a logged-in administrator to perform unwanted actions on the IBM WebSphere administrative console, by enticing him to visit a malicious web page.

Recent Exploits: