header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! Component Simple Membership v3.3.3 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component Simple Membership v3.3.3. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to extract sensitive information from the database.

Netgear R7000 and R6400 cgi-bin Command Injection

NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.

Security Issue in Shared Folder Implementation

There is a security issue in the shared folder implementation that permits cooperating guests with write access to the same shared folder to gain access to the whole filesystem of the host, at least on Linux hosts. The issue is that, when the host checks whether a given path escapes the root directory of the shared folder in vbsfPathCheckRootEscape(), the function assumes that the directory hierarchy is static: E.g. the path "base/a/b/c/../../.." is assumed to be equivalent to "base/a/b/../..", "base/a/.." and "base". However, at least on Linux, renames can occur at the same time as path traversal. This means that, if VM A attempts to open "base/a/b/c/../../../foo" while VM B is moving "base/a/b/c" to "base/c_", VM A might actually end up opening "base/../../foo" instead of "base/foo".

Cerberus FTP server – Denial of Service

A buffer overflow vulnerability exists in Cerberus FTP server version 8.0.10.1, which could allow an unauthenticated attacker to cause a denial of service condition. The vulnerability is due to improper validation of user-supplied input when handling a specially crafted HTTP request. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. Successful exploitation of this vulnerability could result in a denial of service condition.

Car Workshop System – SQL Injection

Car Workshop System is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information such as database name, version, etc. The vulnerable parameter is job_id in the URL http://localhost/[PATH]/services/print_service_invoice?job_id=[SQL]. An example of a malicious payload is 6'+/*!50000union*/+select+1,2,3,/*!50000concat*/(database(),0x7e,version()),5,6,7,8,9,10,11,12--+-.

Fiyo CMS 2.0.6.1 allows remote authenticated users to gain privileges via a modified level parameter

Fiyo CMS have five user group (super administrator, administrator, editor, publisher, member) and only three group can access backend page of admin (super administrator, administrator and editor). If we login as super administrator and access edit profile menu, check source code (ctrl+u) from your browser and we get level privilege: super administrator = 1, administrator = 2, editor = 3, publisher = 4, member = 5. If we change the level parameter to 1, we can gain super administrator privileges.

Mirage – Fancy Clone – SQL Injection

An attacker can exploit a SQL injection vulnerability in Mirage – Fancy Clone to gain unauthorized access to the application. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'c' parameter of the 'shopby' module. An attacker can send malicious SQL queries to the application, allowing them to bypass authentication and gain access to unauthorized data.

MobaXterm TFTP Directory Traversal 0day Exploit

Remote attackers can use UDP socket connection to TFTP server port 69 and send Read request, to retrieve otherwise protected files using directory traversal attacks e.g. ../../../../Windows/system.ini. Start MobaXterm TFTP server which listens on default TFTP port 69.

PHP Forum Script v3.0 – SQL Injection

An attacker can exploit a SQL injection vulnerability in PHP Forum Script v3.0 by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the backend database, potentially resulting in the manipulation or disclosure of application data.

Recent Exploits: