header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection in phplist 3.2.6

It is possible for an unauthenticated user to perform an SQL injection when updating the subscription information of an already subscribed user. The protection against SQL injection relies on a combination of a custom magic quotes function which applies addslashes to all input values and a function which applies htmlspecialchars to all inputs. Additionally, some input values are cast to integers to prevent injections. addslashes protects against injections into arguments which are placed into single quotes, while htmlspecialchars protects against injections into double quotes. It should be noted that neither addslashes nor htmlspecialchars are recommended to prevent SQL Injection. The update functionality is vulnerable to SQL Injection as it uses the key of POST data, while only values of POST data are escaped via addslashes, but not keys.

Google Nest Cam – Multiple Buffer Overflow Conditions Over Bluetooth LE

It's possible to trigger a buffer overflow condition when setting the SSID parameter or encrypted password parameter on the camera. The attacker must be in bluetooth range at any time during the cameras powered on state. Bluetooth is never disabled even after initial setup. The payload attempts to set an SSID or encrypted password with a length of 1 byte and sends 16.

Joomla! Component JooCart (Joomla OpenCart Integration) v2.x – SQL Injection

A SQL injection vulnerability exists in Joomla! Component JooCart (Joomla OpenCart Integration) v2.x. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, such as user credentials, or to modify or delete data.

ExtraPuTTY TFTP Denial of Service

ExtraPuTTY TFTP server component is vulnerable to remote Denial of Service attack by sending large junk UDP Read/Write TFTP protocol request packets. A malicious user can send a large junk UDP Read/Write TFTP protocol request packets to ExtraPuTTY TFTP server component, which will cause the application to crash.

HttpServer 1.0 DolinaySoft Directory Traversal

This vulnerability allows an attacker to view arbitrary files within the context of the web server by using a directory traversal attack. This is done by using the '..%5c..%5c' sequence in the URL, which allows the attacker to traverse up the directory tree and access files outside of the web root.

FTPShell Server 6.56 ChangePassword DEP off BufferOverflow 0Day

FTPShell Server 6.56 is vulnerable to a buffer overflow vulnerability when a maliciously crafted string is sent to the ChangePassword function. This can be exploited to execute arbitrary code by overwriting the saved return address with a pointer to the shellcode.

Secure Download Links – SQL Injection

An SQL injection vulnerability exists in the Secure Download Links software, which allows an attacker to execute arbitrary SQL commands on the underlying database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'dc' parameter of the 'download.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script.

Omegle Clone – SQL Injection

The Omegle Clone script is vulnerable to SQL injection. Attackers can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameters in the randomChat.php, listenToReceive.php, typing.php, isTyping.php, and saveLog.php scripts. This can allow attackers to access sensitive information such as the AdminID, AdminPass, Email, PayPal, and IpnMode settings.

Recent Exploits: