header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AdaptCMS <= 2.0.4 SQL Injection vulnerability

AdaptCMS is vulnerable to a really unusual SQL injection. The code in config.php acts like addslashes, but a couple of lines after, there is an SQL query which is vulnerable to injection. A POST http request can be used to insert a custom choice in the poll, which contains the admin credentials.

ArrowChat <=~ 1.5.61 Multiple vulnerabilities

ArrowChat is a chat script, which is able to be integrate in various CMS, as wordpress, or some bulletin boards. The vulnerability is due to the lack of secure validation of the 'lang' parameter in the external.php file, which allows an attacker to include arbitrary files on the server. Additionally, the reflected XSS vulnerability is due to the lack of secure validation of the 'PHP_SELF' parameter in the admin/layout/pages_general.php file, which allows an attacker to inject arbitrary HTML and script code.

Use After Free Vulnerability in Opera Browser

A use-after-free vulnerability exists in Opera Browser due to improper handling of (use tag + clippath) which tries to access freed object. An attacker can exploit this vulnerability by spraying the heap with 0x78 size of block using ArrayBuffer() and then freeing the allocation. The freed block contains the attacker's data which is then accessed by the browser.

DataLife Engine preview.php PHP Code Injection

This module exploits a PHP code injection vulnerability DataLife Engine 9.7. The vulnerability exists in preview.php, due to an insecure usage of preg_replace() with the e modifier, which allows to inject arbitrary php code, when the template in use contains a [catlist] or [not-catlist] tag.

Buffalo TeraStation TS-Series multiple vulnerabilities

Requesting an unprotected cgi, it's possible, for an unauthenticated user, to download any system file, included /etc/shadow, that contains the password shadows for the application/system users. Moreover, using the key 'all' it's possible to download the entire /var/log directory. This vulnerability also allows authenticated users to execute arbitrary commands on the system with root privileges.

Unauthenticated remote access to D-Link DCS cameras

D-Link DCS web cameras allow unauthenticated attackers to obtain the configuration of the device remotely. A copy of the device configuration can be obtained by accessing the following URL: http://<device IP address>/frame/GetConfig. The obtained configuration file is obfuscated using a trivial obfuscation scheme.

Recent Exploits: