header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[waraxe-2012-SA#086] – Local File Inclusion in Invision Power Board 3.3.0

Using unsanitized user submitted data for file operations, attacker must be logged in as valid user, PHP must be < 5.3.4 for null-byte attacks to work. Result: remote file disclosure, php remote code execution.

IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Overflow

This module exploits a buffer overflow vulnerability in the Isig.isigCtl.1 ActiveX installed with IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1. The vulnerability is found in the 'RunAndUploadFile' method where the 'OtherFields' parameter with user controlled data is used to build a 'Content-Disposition' header and attach contents in an insecure way which allows to overflow a buffer in the stack.

PlumeCMS <= 1.2.4 Multiple Persistent XSS

PlumeCMS 1.2.4 (and below) is prone to multiple persistent XSS vulnerability due to an improper input sanitization of multiple parameters. The 'u_email' parameter and 'u_realname' parameter are not correctly sanitized before being passed to the server-side script 'manager/users.php' via HTTP POST method. An attacker who is able to change his profile settings could insert malicious code into the 'Email' field within the 'Authors' template, creating a persistent XSS vulnerability for all users/admins who access the Plume's management interface.

ArticleSetup Multiple Persistence Cross-Site Scripting and SQL Injection Vulnerabilities

ArticleSetup Multiple Persistence Cross-Site Scripting and SQL Injection Vulnerabilities. i) Input passed via the 'userid' and 'password' parameter in '/upload/login.php' page is not properly verified before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL queries. ii) Input passed via the 'userid' and 'password' parameter in '/upload/admin/login.php' page is not properly verified before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL queries.iii) Input passed via the 'cat' parameter in 'upload/feed.php' page is not properly verified before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL queries. iV) Input passed via the 's' parameter in 'upload/search.php' page is not properly verified before being used in an SQL query.

[waraxe-2012-SA#081] – Multiple Vulnerabilities in Coppermine 1.5.18

The Coppermine web picture gallery script version 1.5.18 is affected by multiple vulnerabilities. The first vulnerability is a stored cross-site scripting (XSS) in the picture keywords feature. This vulnerability allows an attacker with appropriate privileges to insert malicious code in the keywords field, which is later displayed in the HTML meta section, leading to XSS attacks. The second vulnerability is a path disclosure vulnerability in the "visible" feature of the software. This vulnerability allows an attacker to disclose sensitive information about the file structure of the server.

Pixelpost <= 1-5rc1-2 privilege escalation exploit

This exploit allows an attacker to escalate their privileges on a Pixelpost installation. The vulnerability exists in the index.php file near lines 670-680, where an SQL injection can be performed. By manipulating the 'category' parameter, an attacker can execute arbitrary SQL commands and potentially gain administrative access to the application.

TRENDnet SecurView TV-IP121WN Wireless Internet Camera UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow

The UltraMJCam ActiveX control in the TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long argument to the OpenFileDlg method, which triggers a stack-based buffer overflow.

Recent Exploits: