header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

3rr0r: ./aroundme_1_1/aroundme/components/core/connect.php (line 25)

A remote file inclusion vulnerability exists in the AroundMe component for Joomla! 1.5.0. The vulnerability is due to the application including a file specified in the language_path parameter of the connect.php script. This can be exploited to execute arbitrary PHP code by including a malicious file from a remote location.

Ghostscript Remote Denial-of-Service Vulnerability

Ghostscript is prone to a remote denial-of-service vulnerability because it fails to properly validate user-supplied input. Exploiting this issue allows remote attackers to crash the application and possibly to execute code, but this has not been confirmed.

Platforms Tested
Ubuntu Ubuntu Linux 8.10 sparc, Ubuntu Ubuntu Linux 8.10 powerpc, Ubuntu Ubuntu Linux 8.10 lpia, Ubuntu Ubuntu Linux 8.10 i386, Ubuntu Ubuntu Linux 8.10 amd64, Ubuntu Ubuntu Linux 8.04 LTS sparc, Ubuntu Ubuntu Linux 8.04 LTS powerpc, Ubuntu Ubuntu Linux 8.04 LTS lpia, Ubuntu Ubuntu Linux 8.04 LTS i386, Ubuntu Ubuntu Linux 8.04 LTS amd64, Ubuntu Ubuntu Linux 6.06 LTS sparc, Ubuntu Ubuntu Linux 6.06 LTS powerpc, Ubuntu Ubuntu Linux 6.06 LTS i386, Ubuntu Ubuntu Linux 6.06 LTS amd64, Sun Solaris 9_x86, Sun Solaris 9, Sun Solaris 10_x86, Sun Solaris 10, Sun OpenSolaris build snv_99, Sun OpenSolaris build snv_96, Sun OpenSolaris build snv_95, Sun OpenSolaris build snv_94, Sun OpenSolaris build snv_93, Sun OpenSolaris build snv_92, Sun OpenSolaris build snv_91, Sun OpenSolaris build snv_90, Sun OpenSolaris build snv_89, Sun OpenSolaris build snv_88, Sun OpenSolaris build snv_87, Sun OpenSolaris build snv_86, Sun OpenSolaris build snv_85, Sun OpenSolaris build snv_84, Sun OpenSolaris build snv_83, Sun OpenSolaris build snv_82, Sun OpenSolaris build snv_81, Sun OpenSolaris build snv_80, Sun OpenSolaris build snv_78, Sun OpenSolaris build snv_77, Sun OpenSolaris build snv_76, Sun OpenSolaris build snv_68, Sun OpenSolaris build snv_67, Sun OpenSolaris build snv_64, Sun OpenSolaris build snv_61, Sun OpenSolaris build snv_59, Sun OpenSolaris build snv_57, Sun OpenSolaris build snv_54, Sun OpenSolaris build snv_50, Sun OpenSolaris build snv_47, Sun OpenSolaris build snv_45, Sun OpenSolaris build snv_39, Sun OpenSolaris build snv_36, Sun OpenSolaris build snv_29, Sun OpenSolaris build snv_22, Sun OpenSolaris build snv_19, Sun OpenSolaris build snv_13, Sun OpenSolaris build snv_114, Sun OpenSolaris build snv_113, Sun OpenSolaris build snv_112, Sun OpenSolaris build snv_111, Sun OpenSolaris build snv_110, Sun OpenSolaris build snv_109, Sun OpenSolaris build snv_108, Sun OpenSolaris build snv_107, Sun OpenSolaris build snv_106, Sun OpenSolaris build snv_105, Sun OpenSolaris build snv_104, Sun OpenSolaris build snv_103, Sun OpenSolaris build snv_102, Sun OpenSolaris build snv_101, Sun OpenSolaris build snv_100, Sun OpenSolaris build snv_98, Sun OpenSolaris build snv_97, Sun OpenSolaris build snv_96, Sun OpenSolaris build snv_95, Sun OpenSolaris build snv_94, Sun OpenSolaris build snv_93, Sun OpenSolaris build snv_92, Sun OpenSolaris build snv_91, Sun OpenSolaris build snv_90, Sun OpenSolaris build snv_89, Sun OpenSolaris build snv_88, Sun OpenSolaris build snv_87, Sun OpenSolaris build snv_86, Sun OpenSolaris build snv_85, Sun OpenSolaris build snv_84, Sun OpenSolaris build snv_83, Sun OpenSolaris build snv_82, Sun OpenSolaris build snv_81, Sun OpenSolaris build snv_80, Sun OpenSolaris build snv_78, Sun OpenSolaris build snv_77, Sun OpenSolaris build snv_76, Sun OpenSolaris build snv_68, Sun OpenSolaris build snv_67, Sun OpenSolaris build snv_64, Sun OpenSolaris build snv_61, Sun OpenSolaris build snv_59, Sun OpenSolaris build snv_57, Sun OpenSolaris build snv_54, Sun OpenSolaris build snv_50, Sun OpenSolaris build snv_47, Sun OpenSolaris build snv_45, Sun OpenSolaris build snv_39, Sun OpenSolaris build snv_36, Sun OpenSolaris build snv_29, Sun OpenSolaris build snv_22, Sun OpenSolaris build snv_19, Sun OpenSolaris build snv_13

Ghostscript Remote Buffer-Overflow Vulnerability

Ghostscript is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into a finite-sized buffer. Exploiting this issue allows remote attackers to overwrite a sensitive memory buffer with arbitrary data, potentially allowing them to execute malicious machine code in the context of the affected application.

WordPress Image Manager Plugins Shell Upload Vulnerability

A vulnerability exists in the Image Manager plugin for WordPress, which allows an attacker to upload a malicious shell to the /demo_images/ directory. This can be done by accessing the /plugins/ImageManager/manager.php page and uploading a GIF89a shell.

SQL Injection, Blind SQL Injection, CSRF and XSS in PHPShop 0.8.1

PHPShop 0.8.1 is vulnerable to SQL Injection, Blind SQL Injection, CSRF and XSS. The SQL Injection security check can be bypassed by replacing spaces with comments (/**/). An attacker can inject malicious SQL queries to gain access to sensitive information from the database. An attacker can also inject malicious JavaScript code to gain access to the user's cookies. An attacker can also perform CSRF attacks to perform malicious actions on behalf of the user.

HTML Help Workshop 4.74 (hhp) Buffer Overflow Exploit (Universal)

A buffer overflow vulnerability exists in HTML Help Workshop 4.74, which could allow remote code execution. The vulnerability is due to a boundary error when handling a specially crafted .hhp file. An attacker could exploit this vulnerability by enticing a user to open a malicious .hhp file. Successful exploitation could result in arbitrary code execution in the context of the user.

Joomla! Component JoomGallery Remote File Inclusion Vulnerability

A remote file inclusion vulnerability exists in Joomla! Component JoomGallery, which allows an attacker to include a remote file on the vulnerable server. This vulnerability is due to the lack of proper validation of user-supplied input in the 'option' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable server.

Recent Exploits: