header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component news SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied data passed to the 'id' parameter in 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit latent vulnerabilities in the underlying database and compromise the system.

SmartVmd ActiveX v 1.1 remote File Overwrite Exploit

This exploit allows an attacker to overwrite a file on the target system. The exploit uses the SaveMaskToFile method of the SmartVmd ActiveX control (clsid:{E3462D53-47A6-11D8-8EF6-DAE89272743C}) to overwrite the file. The exploit is triggered by clicking on a malicious button.

Fhimage Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable Fhimage 1.2.1 web application. The exploit works only when register_globals and magic_quotes_gpc are both set to On. The exploit injects malicious code into the configuration file of the application and then executes the code via a GET request.

.::ESPG 1.72 File Disclosure Vulnerability::.

ESPG (Enhanced Simple PHP Gallery) 1.72 is vulnerable to a file disclosure vulnerability. This vulnerability is due to an input validation error when handling user-supplied input. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters to the vulnerable application. This can allow the attacker to view arbitrary files on the system, potentially resulting in the disclosure of sensitive information.

Recent Exploits: