header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection in webERP

A SQL injection vulnerability was discovered in webERP version 4.11.3. An attacker can send a specially crafted HTTP POST request to the SalesInquiry.php script, which contains malicious SQL code in the 'DebtorNameOp' parameter. This can allow an attacker to execute arbitrary SQL commands on the underlying database.

Arbitrary File Upload in VideoWhisper Live Streaming Integration

VideoWhisper Live Streaming Integration does not properly verify malicious file extensions before uploading files to the server in "/wp-content/plugins/videowhisper-live-streaming-integration/ls/vw_snaps hots.php". A remote attacker can upload and execute arbitrary PHP file on the target system.

Privilege escalation vulnerability

SEC Consult identified a privilege escalation vulnerability in the MICROSENS Web Manager in the course of a very limited infrastructure audit. The Web Manager can be used with read only permission to check the configuration on the device (e.g. VLANs, Port status). Additionally the Web Manager can be used with read and write permission to configure the device. Using the identified vulnerability a low privileged user having read only permission can elevate his privileges to contain read and write permissions. The login attempt is checked through a CGI binary, but the response of the binary is validated at the client side via JavaScript. An attacker can manipulate the response of the CGI binary and can bypass the client side validation.

Webuzo Multiple Vulnerabilities

Webuzo 2.1.3 has been identified with multiple security vulnerabilities, which can be exploited to perform remote OS command injection, execute malicious script and enumerate users. Authentication is not required to exploit these issues.

GoldMP4Player Buffer Overflow (SEH)

GoldMP4Player is vulnerable to a buffer overflow vulnerability when a maliciously crafted .swf file is opened via File -> Open Flash URL. The vulnerability is caused due to a boundary error when handling the URL parameter, which can result in a stack-based buffer overflow. This may allow a remote attacker to execute arbitrary code within the context of the application.

Multiple vulnerabilities in PHP-CMDB

Multiple vulnerabilities exist in PHP-CMDB version 0.7.3, including XSS and SQL Injection. An attacker can exploit these vulnerabilities by sending a maliciously crafted request to the vulnerable application. The XSS payload is sent in the 's_text', 'ci_icon', 's_text', 's_cit_id', 's_cat_id', 's_compare_operator', 'u_login', 'u_last_name', 'u_first_name', and 'u_password_confirm' parameters, while the SQL Injection payload is sent in the 's_text' and 'u_login' parameters.

Bluetooth Photo Share Pro v2.0 iOS – Multiple Vulnerabilities

The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the web-application or mobile device. The persistent input validation web vulnerability allows remote attackers to inject own malicious script codes to the application-side of the service.

GDL 4.2 Multiple Vulnerabilities

GDL 4.2 is vulnerable to directory traversal attacks. An attacker can exploit this vulnerability to read arbitrary files from the server. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'newlang' and 'newtheme' parameters in the 'gdl.php' and 'index.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to the vulnerable script. Successful exploitation of this vulnerability will allow an attacker to read arbitrary files from the server.

Recent Exploits: