header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BibCiter 1.4 Multiple SQL Injection Vulnerability

BibCiter 1.4 is vulnerable to multiple SQL injection vulnerabilities due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, such as usernames and passwords, or to modify the contents of the database.

MPlayer 1.0rc2 TwinVQ Stack Buffer Overflow PoC

MPlayer 1.0rc2 is vulnerable to a stack buffer overflow when processing a specially crafted TwinVQ (.vqf) file. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when copying data from the TwinVQ file into a fixed-length buffer on the stack. This can be exploited to cause a stack-based buffer overflow by supplying a specially crafted TwinVQ file with an overly long header field.

AJClassifieds Merchandise RFu

AJClassifieds Merchandise is prone to a remote file-upload vulnerability because it fails to adequately sanitize user-supplied input. An attacker can exploit this issue to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

AJClassifieds Personals RFu

AJClassifieds Personals is prone to a remote file-upload vulnerability because it fails to adequately sanitize user-supplied input. An attacker can exploit this issue to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

AJClassifieds Realestate RFu

AJClassifieds Realestate is prone to a remote file-upload vulnerability because it fails to adequately sanitize user-supplied input. An attacker can exploit this issue to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

BlogIt! Vulnerabilities

The BlogIt! application is vulnerable to SQL injection, directory traversal and XSS attacks. An attacker can exploit the SQL injection vulnerability by sending malicious SQL queries to the vulnerable parameter 'day' in the 'index.asp' page. The directory traversal vulnerability can be exploited by accessing the 'Blog.mdb' file in the 'database' directory. The XSS vulnerability can be exploited by sending malicious JavaScript code to the 'view' parameter in the 'index.asp' page.

RankEm

The vulnerability is a combination of DD, XSS and CM. DD is a vulnerability that allows an attacker to download the database file topsites.mdb from the path /database/. XSS is a vulnerability that allows an attacker to inject malicious JavaScript code into the siteID parameter of the rankup.asp page. CM is a vulnerability that allows an attacker to inject malicious meta tags into the siteID parameter of the rankup.asp page.

MetaProducts MetaTreeX V 1.5.100 Remote File Overwrite Exploit

This exploit allows an attacker to overwrite a file on the target system. The vulnerability exists in the SaveToBMP() function of the MetaTreeX ActiveX control, which is identified by the CLSID {67E66985-F81A-11D6-BC0F-F7B40157DC26}. The SaveToBMP() function allows an attacker to specify a file path, which can be used to overwrite an existing file on the target system.

Recent Exploits: