header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PicMe v2.1.0 Upload Shell Vulnerability

PicMe v2.1.0 is vulnerable to an upload shell vulnerability. An attacker can exploit this vulnerability by sending a malicious file to the upload page, which will be stored in the 'uploads' directory. The attacker can then access the malicious file and execute arbitrary code on the server.

iDevAffiliate v4.0 Backup Vulnerability

The vulnerability exists in iDevAffiliate v4.0, which allows an attacker to access the backup directory of the application. By accessing the backup directory, the attacker can download the backup files and gain access to the application's data.

Quick Player v1.2 unicode buffer overflow exploit

Quick Player v1.2 is vulnerable to a buffer overflow exploit due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted M3U file to the application, which can lead to arbitrary code execution. This exploit was discovered by Corelan Security Team and was tested on Windows XP SP3.

ezscheduler exploit

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'calendar.mdb' parameter to '/datastores/' directory. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.

ezguestbook SQL Injection Vulnerability

A SQL injection vulnerability exists in ezguestbook, which allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input in the 'gstbk.mdb' parameter. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

My Book World Edition NAS multiple vulnerability

My Book World Edition NAS is vulnerable to Remote Command Execution, Web Server Default Security Misconfiguration, Information Disclosure, and Cross Site Scripting (XSS). Remote Command Execution can be achieved by entering a malicious command in the NTP TIME SERVER box on the e_datetime.php and system_general.php pages. Web Server Default Security Misconfiguration can be exploited by running commands with root privileges. Information Disclosure can be exploited by browsing the express.php page. Cross Site Scripting (XSS) can be exploited by entering malicious code in the ?lang= parameter of multiple pages.

Exploit for Microsoft IIS ASP Multiple Extensions Security Bypass 5.x/6.x

The Vulnerability discovered in Microsoft Internet Information Services (IIS) can be exploited by malicious people to potentially bypass certain security restrictions and compromise a vulnerable system. The vulnerability is caused due to the web server incorrectly executing e.g. ASP code included in a file having multiple extensions separated by ';', if the first extension is equal to '.asp' (e.g. 'file.asp;.jpg'). This can be exploited to potentially upload and execute arbitrary ASP code via a third-party application using file extensions to restrict uploaded file types.

Recent Exploits: