header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NEPT Image Uploader shell upload

It is possible to upload a php script to the remote site. 1. Select a php file for upload 2. Select it for upload, and tamperdata the request 3. Change the Content-Type from 'application/octet-stream' to 'image/jpeg' 4. If the link provided gives a 404, add 'upload/' before the file name

AJ Forced Matrix Script Remote SQL Injection Vulnerability

AJ Forced Matrix Script is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

db Software Laboratory VImpX (VImpX.ocx) Multiple vulnerabilities

db Software Laboratory VImpX (VImpX.ocx) is vulnerable to buffer overflow, file content deletion and file content overwrite. Passing an overly long string (more than 256 bytes) to the LogFile property will lead to a stack based buffer overflow which allows arbitrary code execution. The LogFile() and SaveToFile() methods do not check user supplied arguments, allowing an attacker to delete or overwrite the content of a file. This vulnerability was tested on Windows XP Professional SP3 with Internet Explorer 7.

Joomla Component Kbase SQL Injection Vulnerability

An SQL injection vulnerability exists in Joomla Component Kbase version 1.2. An attacker can exploit this vulnerability to inject malicious SQL queries into the application, allowing them to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL queries to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.

Joomla Component Archaic Binary Gallery Directory Traversal Vulnerability

A Directory Traversal vulnerability was discovered in Joomla Component Archaic Binary Gallery. The vulnerability is caused due to the improper validation of user-supplied input in the 'gallery' parameter of the 'index.php' script. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

In vstudio command prompt: mk.bat

This vulnerability is a stack overflow vulnerability which allows an attacker to execute arbitrary code on the target system. It occurs when a program writes more data to a buffer than it can hold, and the extra data overwrites adjacent memory locations. This can corrupt data, crash the program, or cause the execution of malicious code.

SiteEngine 5.x Multiple Remote Vulnerabilities

Due to incorrect use of intval function, leading to the logic of inspection parameters can be bypassed, resulting in SQL injection vulnerability. POC: http://www.test.com/announcements.php?id=1%bf%27%20and%201=2%20%20UNION%20select%201,2,user(),4,5,6,7,8,9,10,11%20/* This vulnerability exist in board.php too…… URI Redirection Vulnerability POC: http://www.test.com/api.php?action=logout&forward=http://evil.com Information Disclosure Vulnerability POC: http://www.test.com/misc.php?action=php_info

WebSVN <= 2.0 Multiple Vulnerabilities

WebSVN is an online SVN repository viewer. There are a several issues in WebSVN which may allow for an attacker to conduct cross site scripting attacks, and create arbitrary files. There is a Cross Site Scripting issue in WebSVN due to the unsafe usage of the PHP_SELF server variable within the getParameterisedSelfUrl() function. A url like the one above would display a JavaScript alert window containing the cookie data of any set cookies for the domain. There are also some file handling issues in the RSS functionality used by WebSVN. The issue is caused by the lack of proper sanitization of the "rev" request variable, which allows arbitrary file operations to be executed.

Recent Exploits: