header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Millenium MP3 Studio 2.0 Buffer overflow exploit

Millenium MP3 Studio 2.0 is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted playlist file to the application, resulting in arbitrary code execution.

Joomla Component com_lyftenbloggie Remote SQL injection vulnerability

A vulnerability exists in the Joomla component com_lyftenbloggie, which could allow an attacker to inject arbitrary SQL commands. This is due to the lack of proper sanitization of user-supplied input to the 'author' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation could result in unauthorized access to sensitive information stored in the database, or even full control of the application.

Cacti 0.8.7e Multiple Security Issues

A HTTP GET request against the URL http://CACTIHOST/graph.php?action=zoom&local_graph_id=1&graph_end=1%27%20style=visibility:hidden%3E%3Cscript%3Ealert(1)%3C/script%3E%3Cx%20y=%27 and a HTTP POST request against http://CACTIHOST/graph_view.php?action=tree&tree_id=1&leaf_id=7&select_first=true with an 'application/x-www-form-urlencoded' content type HTTP body part containing date1=%27%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E%3Cx+y%3D%27' can be used to exploit the Cross Site Scripting vulnerability in Cacti 0.8.7e and earlier versions.

phpBazar-2.1.1fix Remote Administration-Panel Vulnerability

A vulnerability exists in phpBazar-2.1.1fix which allows an attacker to gain access to the admin control panel. The attacker can use a Dork to find vulnerable sites and then access the admin control panel by entering the URL http://server/path/admin/admin.php or http://server/admin/admin.php.

Joomla Component com_gcalendar 1.1.2 (gcid) Remote SQL Injection Vulnerability

Remote SQL Injection were identified in Google Calendar Joomla Component. SQL Injection attacks are another instantiation of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. An example exploit is provided in the text.

turkish radio php script

RADIO istek scripti (tr) Version 2.5 (tr) is vulnerable to a remote configuration vulnerability. An attacker can exploit this vulnerability by using a dork such as '2007 RADIOZAZA www.radiozaza.de? istek hatti Version 2.5' or 'estafresgaftesantusyan.inc' to find vulnerable sites and then accessing the estafresgaftesantusyan.inc file to view the configuration information.

Fake Hit Generator Shell Upload Vulnerability

The vulnerability allows an attacker to upload a malicious file to the web server. The vulnerability exists due to insufficient validation of the file type that is being uploaded. An attacker can exploit this vulnerability by uploading a malicious file to the web server.

Python’s ‘imageop’ module Buffer-Overflow Vulnerability

Python's 'imageop' module is prone to a buffer-overflow vulnerability. Successful exploits may allow attackers to execute arbitrary code in the context of applications using the vulnerable Python module. This may result in a compromise of the underlying system. Failed attempts may lead to a denial-of-service condition.

Platforms Tested
VMWare vMA 4.0, VMWare ESX Server 3.0.3, VMWare ESX Server 2.5.5, VMWare ESX Server 4.0, VMWare ESX Server 3.5, Ubuntu Ubuntu Linux 8.10 sparc, Ubuntu Ubuntu Linux 8.10 powerpc, Ubuntu Ubuntu Linux 8.10 lpia, Ubuntu Ubuntu Linux 8.10 i386, Ubuntu Ubuntu Linux 8.10 amd64, Ubuntu Ubuntu Linux 8.04 LTS sparc, Ubuntu Ubuntu Linux 8.04 LTS powerpc, Ubuntu Ubuntu Linux 8.04 LTS lpia, Ubuntu Ubuntu Linux 8.04 LTS i386, Ubuntu Ubuntu Linux 8.04 LTS amd64, Ubuntu Ubuntu Linux 6.06 LTS sparc, Ubuntu Ubuntu Linux 6.06 LTS powerpc, Ubuntu Ubuntu Linux 6.06 LTS i386, Ubuntu Ubuntu Linux 6.06 LTS amd64, S.u.S.E. SUSE Linux Enterprise Server 10 SP2, S.u.S.E. SUSE Linux Enterprise Desktop 10 SP2, S.u.S.E. SLE SDK 10 SP2, S.u.S.E. openSUSE 11.1, S.u.S.E. openSUSE 11.0, S.u.S.E. openSUSE 10.3, S.u.S.E. Open-Enterprise-Server 0, S.u.S.E. Novell Linux POS 9, S.u.S.E. Novell Linux Desktop 9, RedHat Enterprise Linux WS 4, RedHat Enterprise Linux WS 3, RedHat Enterprise Linux ES 4, RedHat Enterprise Linux ES 3, RedHat Enterprise Linux Desktop Workstation 5 client, RedHat Enterprise Linux Desktop 5 client, RedHat Enterprise Linux AS 4, RedHat Enterprise Linux AS 3, RedHat Enterprise Linux Desktop version 4, RedHat Enterprise Linux 5 server, RedHat Desktop 3.0, Python Software Foundation Python 2.5.1, Python Software Foundation Python 2.4.5, Python Software Foundation Python 2.4.4 r14, Python Software Foundation Python 2.4.4, Python Software Foundation Python 2.4.3, Trustix Secure Linux 3.0.5, Pythian Linux 2.6.9

Recent Exploits: