header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[ONSEC-09-020] Mura CMS root folder disclosure

content management system Mura CMS found a number of information disclosure vulnerability. An attacker can learn the version and type of database driver, database name, structure and format of some DBMS tables, column names, their type and size information about the Web server and virtual machine, Java. The vulnerability exists due to the error message when you try to write in the database values is not suitable for the format.

Mongoose Web Server <= 2.8.0 Remote Source Disclosure

Mongoose Web Server <= 2.8.0 is a Windows based HTTP server. This is the latest version of the application available. Mongoose is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP][:port]/[ file ][/] http://172.16.2.101:8080/index.html/ http://172.16.2.101:8080/index.php/

.mpf File Local Stack Overflow Exploit (SEH)

A stack-based buffer overflow vulnerability exists in Millenium MP3 Studio v2.0. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability is due to a boundary error when handling .mpf files. An attacker can exploit this vulnerability by enticing a user to open a specially crafted .mpf file with the vulnerable application. This will trigger a stack-based buffer overflow and allow the attacker to execute arbitrary code.

.m3u File Local Stack Overflow Universal Exploit (SEH)

A stack-based buffer overflow vulnerability exists in Millenium MP3 Studio v2.0. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability is due to a boundary error when handling .m3u files. An attacker can exploit this vulnerability by enticing a user to open a specially crafted .m3u file with the vulnerable application.

Joomla Component com_photoblog SQL injection vulnerability – (category)

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'category' in the URL. The malicious query will be executed in the backend database, allowing the attacker to access sensitive information such as usernames and passwords.

Joomla Component com_jshop SQL Injection Vulnerability

A SQL injection vulnerability exists in Joomla Component com_jshop, which allows an attacker to execute arbitrary SQL commands via the 'pid' parameter in a 'index.php' request. An attacker can exploit this vulnerability to gain access to sensitive information in the back-end database, such as usernames and passwords.

Joomla JD-WordPress Vulnerability File Inclusion

A vulnerability in Joomla JD-WordPress allows an attacker to execute arbitrary code on the vulnerable system by including a malicious file via a specially crafted URL. This vulnerability is due to insufficient sanitization of user-supplied input to the 'mosConfig_absolute_path' parameter of the 'wp-feed.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the web server process.

Joomla Component com_ajaxchat Remote File Include vulnerability

A Remote File Include (RFI) vulnerability exists in Joomla Component com_ajaxchat. The vulnerability is due to the 'ajcuser.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote hosts and execute arbitrary PHP code on the vulnerable system.

Recent Exploits: