header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HTC / Windows Mobile OBEX FTP Service Directory Traversal

HTC devices running Windows Mobile 6 and Windows Mobile 6.1 are prone to a directory traversal vulnerability in the Bluetooth OBEX FTP Service. Exploiting this issue allows a remote authenticated attacker to list arbitrary directories, and write or read arbitrary files, via a ../ in a pathname. This can be leveraged for code execution by writing to a Startup folder.

AwingSoft Web3D Player (WindsPly.ocx) “SceneURL()” Remote Buffer Overflow

AwingSoft Web3D Player (WindsPly.ocx) is vulnerable to a remote buffer overflow vulnerability when the SceneURL() method is called with an overly long string. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page. The vulnerability is caused due to a boundary error within the processing of the SceneURL() method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string to the SceneURL() method.

Retina WiFi Security Scanner 1.0 (.rws parsing) Buffer Overflow Vulnerability

Retina WiFi Scanner is a tool to be used to detect IEEE 802.11 (WiFi) based devices. A buffer overflow vulnerability exists in Retina WiFi Scanner 1.0.8.68 when parsing .rws files. An attacker can exploit this vulnerability by supplying a specially crafted .rws file, which can lead to arbitrary code execution.

OtsAv DJ & TV [.olf] Local Heap Overflow Poc

OtsAv DJ & TV are vulnerable to a local heap overflow vulnerability. An attacker can exploit this vulnerability by creating a malicious .olf file containing a large number of 'A' or '45' characters and then importing it as a playlist. This will cause a heap overflow and can lead to arbitrary code execution.

Jobbr v2.2.7 Multiple Remote SQL Injection Vulnerabilities

Jobbr v2.2.7 is vulnerable to multiple remote SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to gain access to the database and execute arbitrary SQL commands. The vulnerable parameters are 'emp_id' in 'co-profile.php' page. An attacker can exploit these vulnerabilities by sending a maliciously crafted HTTP request to the vulnerable page. An example of a maliciously crafted HTTP request is http://www.jobbr.us/co-profile.php?emp_id=null+union+select+version(),2,3,4,5,6,7,8--. Another example of a maliciously crafted HTTP request is http://www.jobbr.us/co-profile.php?EMP_id=1+AND%20SUBSTRING(@@version,1,1)=5.

WordPress Privileges Unchecked in admin.php and Multiple Information Disclosures

A vulnerability was found in the way that WordPress handles some URL requests. This results in unprivileged users viewing the content of plugins configuration pages, and also in some plugins modifying plugin options and injecting JavaScript code. Arbitrary native code may be run by a malicious attacker if the blog administrator runs injected JavaScript code that edits blog PHP code. Many WordPress-powered blogs, hosted outside 'wordpress.com', allow any person to create unprivileged users called subscribers. Other sensitive username information disclosures were found in WordPress.

Phenotype v2.8 Blind Sql Injection

A Blind SQL Injection vulnerability exists in Phenotype v2.8 which allows an attacker to gain access to the admin username and password. This is done by sending a specially crafted HTTP request to the login.php page with the user parameter set to a malicious SQL query. The malicious query is designed to extract the admin username and password from the user table in the database. The attacker can then use the obtained credentials to gain access to the admin panel.

Recent Exploits: