header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Klonet E-Commerce SQL Injection

Klonet E-Commerce is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Core FTP LE v2.1 build 1612 Local Buffer Overflow PoC (Unicode)

Core FTP LE v2.1 build 1612 is vulnerable to a local buffer overflow vulnerability when a user connects to a maliciously crafted FTP server. The vulnerability is triggered when a user connects to a maliciously crafted FTP server and the server sends a specially crafted response containing a large amount of data. This causes a buffer overflow in the application, which can be exploited to execute arbitrary code.

CDBurnerXP v 4.2.4.1351 Local Crash PoC

CDBurnerXP v 4.2.4.1351 is vulnerable to a local crash due to a Null Reference Exception. This vulnerability can be triggered by creating a new data disc, adding a folder, pasting to rename the folder, and clicking 'Save Compilation as ISO'. The crash occurs due to a lack of proper input validation when handling user-supplied data.

Mereo Web Server v1.8 Multiple Remote Source Code Disclosure

Mereo Web Server v1.8 is a Windows based HTTP server. This is the latest version of the application available. Mereo is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP]/[ file ][.] http://[ webserver IP]/[ file ][::$DATA]

Joomla Component com_ircmbasic SQL injection vulnerability

A SQL injection vulnerability exists in Joomla Component com_ircmbasic. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'p3' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database.

Digital Security Research Group [DSecRG] Advisory #DSECRG-09-044

SAP GUI for Windows 7.1 and 6.4 contains ActiveX component EAI WebViewer3D ( file WebViewer3D.dll) Lib GUID: {AFBBE070-7340-11d2-AA6B-00E02924C34E} which is contains insecure method that can overwrite any file in system. Attacker can construct html page which call one of the wulnerable functions such as SaveToSessionFile or SaveViewToSessionFile from ActiveX component EAI WebViewer3D.

HP LoadRunner 9.5 Persits.XUpload.2 control (XUpload.ocx) MakeHttpRequest() remote file creation poc (IE 8)

This exploit allows an attacker to create a remote file on the target system using the MakeHttpRequest() method of the Persits.XUpload.2 control (XUpload.ocx). The attacker can specify the server, script, method, parameters, path, user agent, and headers of the request. In this example, the attacker is using the MakeHttpRequest() method to create a batch script that starts calc.exe in the Startup folder of the target system.

Recent Exploits: