header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mail Masta WP Local File Inclusion

The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a 'dynamic file inclusion' mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation. Typical proof-of-concept would be to load passwd file: http://server/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd

ObiHai ObiPhone – Multiple Vulnerabilities

By providing a long URI (longer than 256 bytes) not containing a slash in a request, a pointer is overwritten which is later passed to free(). By controlling the location of the pointer, this would allow an attacker to affect control flow and gain control of the application. Note that the free() seems to occur during cleanup of the request, as a 404 is returned to the user before the segmentation fault.

Sakai 10.7 Multiple Vulnerabilities

Sakai suffers from multiple reflected cross-site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Ocomon 2.0: Acess administrative Bypass / Multiple Sql Injection

Ocomon 2.0RC6 is vulnerable to multiple SQL injection attacks. An attacker can exploit this vulnerability by using the 'admin'or'' as the username and password to gain access to the administrative page of the system.

Recent Exploits: