header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NCTsoft AudFile.dll ActiveX Control Remote Buffer Overflow

A buffer overflow vulnerability exists in NCTsoft AudFile.dll ActiveX Control (AudFile.dll 1.0.0.1) that could allow a remote attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error within the processing of the 'OpenFile()' method. By sending a specially crafted HTTP request, an attacker can cause a stack-based buffer overflow and execute arbitrary code on the system with the privileges of the user running the application.

F-PROT Antivirus 6.2.1.4252 Infinite Loop Denial of Service Vulnerability

F-PROT Antivirus is prone to a denial-of-service vulnerability because the application fails to properly handle certain files. An attacker can exploit this issue to cause the application to enter an infinite loop, denying service to legitimate users.

Multiple Vulnerabilities in Pligg

Pligg is a popular open source, full featured, content management system written in php. There are a number of vulnerabilities within Pligg that allow for remote file enumeration, file inclusion, cross site scripting, and sql injection. When combined these issues allow for remote code execution on the affected installation via arbitrary php code placed within template files once admin credentials are gained via SQL Injection. Cross Site Scripting issues in Pligg that allow for the theft of client side credentials such as cookies. A number of file access issues exist in Pligg. They range from the not so severe (such as arbitrary file enumeration) to the much more severe (arbitrary file inclusion). In regards to the arbitrary file enumeration a good example of it can be found in trackback.php @ line 76.

eNdonesia 8.4 Remote SQL Exploit

This exploit allows an attacker to inject malicious SQL queries into the vulnerable eNdonesia 8.4 Calendar Module. The exploit is triggered when the vulnerable parameter 'loc_id' is passed to the 'mod.php' script with a malicious SQL query. This can allow an attacker to gain access to the database and extract sensitive information such as usernames and passwords.

TubeGuru (ugroups php UID) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in TubeGuru ugroups php UID. An attacker can exploit this vulnerability to inject malicious SQL queries in the application, allowing them to gain access to sensitive information stored in the database. The vulnerable parameter is UID which can be exploited by sending a malicious payload to the application. The payload is -1 UNION SELECT 1,concat_ws(0x3a,username,pwd),3,4,5,6,7,8,9,10,11,12,13,14,15+from+signup-- which can be used to extract sensitive information from the database.

Classified Ads (cid) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in the Classified Ads (cid) script. An attacker can exploit this vulnerability to gain access to sensitive information such as admin credentials. The vulnerability is due to insufficient sanitization of user-supplied input to the 'cid' parameter in the 'browsecats.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information such as admin credentials.

HIOX Browser Statistics 2.0 Arbitrary Add Admin User Vulnerability

HIOX Browser Statistics 2.0 is vulnerable to an arbitrary add admin user vulnerability. An attacker can exploit this vulnerability to add an admin user to the application. This vulnerability is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request to the application.

HIOX Random Ad 1.3 Arbitrary Add Admin User Vulnerability

HIOX Random Ad 1.3 is vulnerable to an arbitrary add admin user vulnerability. An attacker can exploit this vulnerability to add an admin user to the application. This vulnerability is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request to the application.

nzFotolog v0.4.1 (Lfi)

A vulnerability exists in nzFotolog v0.4.1 which allows an attacker to include a file from the local system. This can be exploited to execute arbitrary PHP code by including files from the local system which contain malicious code. The vulnerability is due to insufficient sanitization of user-supplied input to the 'action_file' parameter in 'index.php'. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte (%00) to the vulnerable script. This can be used to include arbitrary files from the local system which may contain malicious PHP code.

Recent Exploits: