header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection Vulnerability in bBlog

The bBlog application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL statements into the 'postid' parameter of the application's URL. Successful exploitation of this vulnerability could lead to a compromise of the application, disclosure or modification of data, or allow the attacker to exploit vulnerabilities in the underlying database implementation.

ERS Viewer 2011 ERS File Handling Buffer Overflow

This module exploits a buffer overflow vulnerability found in ERS Viewer 2011 (version 11.04). The vulnerability exists in the module ermapper_u.dll where the function ERM_convert_to_correct_webpath handles user provided data in a insecure way. It results in arbitrary code execution under the context of the user viewing a specially crafted .ers file. This module has been tested successfully with ERS Viewer 2011 (version 11.04) on Windows XP SP3 and Windows 7 SP1.

Denial of Service in Multiple Vendor TCP/IP Stack Implementations

The vulnerability occurs when an erroneous TCP acknowledgement number is encountered in an active TCP session stream. This can result in a degradation of the target connection, effectively denying service for legitimate users. It may also cause CPU performance degradation on the attacked computer, potentially denying service for local users as well.

Wireless Photo Access 1.0.10 iOS – Multiple Vulnerabilities

Wireless Photo Access 1.0.10 iOS is prone to multiple vulnerabilities including arbitrary file upload, cross-site scripting and remote code execution vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in the context of an arbitrary code execution vulnerability. An attacker can exploit these issues to upload arbitrary files, execute arbitrary script code in the context of the affected site, steal cookie-based authentication credentials, and perform unauthorized actions. This may aid in launching further attacks.

Ajax Availability Calendar 3.X.X Multiple Vulnerabilties

The Ajax Availability Calendar 3.X.X script is vulnerable to SQL Injection, Reflected XSS, and Full Path Disclosure vulnerabilities. The SQL Injection vulnerability allows an attacker to execute arbitrary SQL commands through the 'id_item' parameter, leading to unauthorized access to the database. The Reflected XSS vulnerability allows an attacker to inject malicious scripts into the 'id_item' parameter, potentially leading to the execution of arbitrary code in the victim's browser. The Full Path Disclosure vulnerability allows an attacker to obtain the full path of the script, which may aid in further attacks.

Cisco Internal Bruteforcer

This program logs into a CISCO router and tries a list of passwords looking for the enable one. It works in password-only CISCO as well as login-pass ones and has been successfully tested on many 2600 and a few 12008 routers. The program's concept is quite simple, bruteforcing a router for gaining enable access. This program has not been seen before.

Recent Exploits: