header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DomPHP 0.82 Local File Inclusion

A local file inclusion vulnerability exists in DomPHP 0.82. An attacker can exploit this vulnerability to include arbitrary files from the local system. This can be exploited to gain access to sensitive information or execute arbitrary code on the vulnerable system. The vulnerable code is located in the /aides/index.php file. The code allows an attacker to include arbitrary files from the local system by sending a specially crafted HTTP request containing directory traversal characters. This can be exploited to include arbitrary files from the local system.

Buffer Overflow Vulnerability in AxRUploadServer.dll, Activex Method (SetLogging)

A buffer overflow vulnerability exists in AxRUploadServer.dll, a component of ImageStation that is a servicemark of Sony Electronics Inc. An access violation occurs when executing 0x42424242. An attacker can exploit this vulnerability by sending a specially crafted string of 5922 'A' characters followed by 5 'B' characters to the SetLogging method of the ez-Upload control. This will cause a buffer overflow and allow arbitrary code execution.

Joomla SQL Injection (com_gallery)

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The crafted request contains a malicious SQL query in the ‘id’ parameter of the ‘func=detail’ component of the vulnerable application. The malicious SQL query can be used to extract sensitive information from the database, such as usernames and passwords.

Commonwealth Business Council SQL Injection

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The crafted request contains a malicious SQL query in the 'sid' parameter of the 'index.php' script. This can allow the attacker to access the application's database and extract sensitive information.

Recent Exploits: