header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla 1.5.12 TinyBrowser File Upload Code Execution

This module exploits a vulnerability in the TinyMCE/tinybrowser plugin. This plugin is not secured in version 1.5.12 of joomla and allows the upload of files on the remote server. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

MacOS X QuickTime RTSP Content-Type Overflow

This exploit is a buffer overflow vulnerability in MacOS X QuickTime RTSP Content-Type. It affects Mac OS X 10.4.0 PowerPC, QuickTime 7.0.0, Mac OS X 10.5.0 PowerPC, QuickTime 7.2.1, Mac OS X 10.4.8 x86, QuickTime 7.1.3 and Mac OS X 10.5.0 x86, QuickTime 7.2.1. It allows an attacker to execute arbitrary code on the target system.

Oscailt 3.3 CMS Local File Inclusion Vulnerability

Oscailt 3.3 CMS is vulnerable to Local File Inclusion vulnerability due to improper sanitization of user input in the index.php file. An attacker can exploit this vulnerability by sending a crafted HTTP request with maliciously crafted obj_id parameter. This can allow an attacker to include arbitrary files from the web server, which can lead to remote code execution. The vulnerable code is located in the index.php file, where the $cachefile variable is used to include a file from the cache directory. The getObjectCacheIndexFile() function is used to construct the path of the file to be included. This function takes the $id parameter and concatenates it with the '.inc' extension, which can be manipulated by an attacker to include arbitrary files from the web server.

ContentKeeper Web Remote Command Execution

This module exploits the ContentKeeper Web Appliance. Versions prior to 125.10 are affected. This module exploits a combination of weaknesses to enable remote command execution as the Apache user. Following exploitation it is possible to abuse an insecure PATH call to 'ps' etc in setuid 'benetool' to escalate to root.

Buffer Overflow in s_send_NSPTDA() Function

A buffer overflow vulnerability exists in the s_send_NSPTDA() function in the code snippet provided. The vulnerability is caused due to the lack of proper validation of user-supplied input when copying it into a fixed-length buffer. An attacker can exploit this vulnerability by supplying a maliciously crafted input that is larger than the fixed-length buffer, resulting in a buffer overflow. This can lead to arbitrary code execution.

PSArt 1.2 Vulnerability

A SQL injection vulnerability was discovered in PSArt 1.2. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'news.asp' script. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script, which will then be executed in the backend database. This can result in the disclosure of sensitive information such as usernames and passwords.

Multiple vulnerabilities in OpenDocMan

OpenDocMan is vulnerable to authentication bypass and multiple cross-site scripting issues. A valid username require to carry put Auth Bypass. Default is 'admin'. Multiple instances of Cross-site scripting found majorly due to use of $_SERVER['PHP_SELF'] in action parameter of form field and due to absence of validation for 'last_message' parameter.

Nginx Worker Process Local Privilege Escalation Vulnerability

A vulnerability in Nginx Worker Process allows an attacker to gain root privileges on a vulnerable system. The vulnerability is due to a race condition in the handling of the SIGCHLD signal. An attacker can exploit this vulnerability by sending a specially crafted SIGCHLD signal to the Nginx Worker Process. This will cause the Nginx Worker Process to execute arbitrary code with root privileges.

NaviCOPA Web Server <= 3.0.1.2 Remote Source Disclosure

NaviCOPA Web Server <= 3.0.1.2 is a Windows based HTTP server. This is the latest version of the application available. NaviCOPA is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP]/[ file ][%20] http://172.16.2.101/index.html%20 http://172.16.2.101/index.php%20 [pocoftheday.blogspot.com]

Recent Exploits: