header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control Buffer Overflow Exploit

This exploit is related to the Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control Buffer Overflow vulnerability. It was written by e.b. and tested on Windows XP SP2(fully patched) English, IE6 + IE7, OfficeScan 7.3 patch 4, OfficeScanRemoveCtrl.dll version 7.3.0.1020. The control is installed when you install OfficeScan through the server web console. This was fixed in OfficeScan 8.x(uses strcpy_s which throws INVALID_PARAMETER, still crashes the browser though).

TalkBack 2.3.5 Local File Inclusion Vulnerability

TalkBack version 2.3.5 is vulnerable to a Local File Inclusion vulnerability. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'language' parameter of the 'help.php' script. An attacker can exploit this vulnerability to include arbitrary local files from the web server, resulting in the disclosure of sensitive information.

Pligg Beta 9.9.0 (id) Remote SQL Injection Vulnerability

Pligg Beta 9.9.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

SiteAdmin CMS Remote Sql Injection Vuln.

A vulnerability exists in SiteAdmin CMS which allows an attacker to inject malicious SQL queries via the 'lng' and 'art' parameters in the 'line2.php' script. This can be exploited to gain access to the admin panel by manipulating the 'auth_users' table in the database.

GC Auction Platinum (cate_id) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can inject malicious SQL queries in the vulnerable parameter ‘cate_id’. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation can allow the attacker to gain access to the database and compromise the application.

Getacoder Clone Script (sb_protype) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in Getacoder Clone Script (sb_protype). An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script in order to execute arbitrary SQL commands in the back-end database.

CMScout 2.05 LFI

A Local File Inclusion (LFI) vulnerability exists in CMScout 2.05 which allows an attacker to include a file from the local file system. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters (e.g. '../') in the 'bit' parameter of the 'common.php' script. This can allow an attacker to read sensitive files from the server, such as configuration files containing database credentials. An attacker can also use this vulnerability to upload a malicious file to the server and execute arbitrary code.

Recent Exploits: