header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Invalid Pointer Free Vulnerability

This vulnerability occurs when a pointer is freed and then used again, leading to a segmentation fault. In this case, the jpg file attached causes an invalid pointer to be freed when media scanning occurs. The backtrace shows that the je_free() function is called from the libc.so library, followed by the free() function, and then the WINKJ_DeleteDeCompress() function from the libQjpeg.so library.

WordPress WP User Frontend Plugin [Unrestricted File Upload]

WordPress plugin WP User Frontend suffers from an unrestricted file uploade vulnerability. An attacker can exploit the wpuf_file_upload or wpuf_insert_image actions to upload any file which pass the WordPress mime and size checks. The attack does not require any privilege to be performed. The mentioned actions are available to non-privileged users also, thus allowing to anyone uploading files to the web server.

WordPress User Meta Manager Plugin [Information Disclosure]

User Meta Manager for WordPress plugin up to v3.4.6 suffers from a information disclosure vulnerability. Any registered user can perform an a series of AJAX requests, in order to get all contents of `usermeta` DB table. `usermeta` table holds additional information for all registered users. User Meta Manager plugin offers a `usermeta` table backup functionality. During the backup process the plugin takes no action in protecting the leakage of the table contents to unauthorized (non-admin) users.

All Solr Data Can Be Delete

Solr is an open source enterprise search platform built on Apache Lucene. It can be used for natural language processing, data research, data mining, and some mobile backends on virtual private servers. An attacker can delete all data in Solr by using a GET request with a delete query and a commit parameter set to true. This can be tested by sending a GET request to the server with the URL http://server:8080/solr/lambeth_planning/select/?q=*%3A*&version=2.2&start=0&rows=10&indent=on and then sending a GET request with the URL http://server:8080/solr/lambeth_locations/update?stream.body=<delete><query>*:*<%2Fquery><%2Fdelete>&commit=true. After this, the first query can be used to verify that all data has been deleted.

Symphony CMS 2.6.3 – Multiple SQL Injection Vulnerabilities

Symphony CMS 2.6.3 is vulnerable to multiple SQL injection vulnerabilities. These vulnerabilities can be exploited by remote attackers to gain access to sensitive information stored in the database. An attacker can exploit these vulnerabilities by sending specially crafted requests to the vulnerable application. The vulnerable parameters are 'fields[username]', 'action[save]' and 'fields[email]' of the '/symphony/system/authors/new/' page.

Time-based SQL Injection in Admin panel UliCMS <= v9.8.1

This bug was found using the portal with authentication as administrator. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable 'country_blacklist' on the page 'action=spam_filter'.

Remote code execution / arbitrary file download in NETGEAR ProSafe Network Management System NMS300

Netgear's NMS300 is a network management utility that runs on Windows systems. It has serious two vulnerabilities that can be exploited by a remote attacker. The first one is an arbitrary file upload vulnerability that allows an unauthenticated attacker to execute Java code as the SYSTEM user. The second vulnerability is an arbitrary file download that allows an authenticated user to download any file from the host that is running NMS300.

WordPress User Meta Manager Plugin [Privilege Escalation]

User Meta Manager for WordPress plugin up to v3.4.6 suffers from a privilege escalation vulnerability. A registered user can modify the meta information of any registered user, including himself. This way he can modify `wp_capabilities` meta to escalate his account to a full privileged administrative account.

DLink DVG­N5402SP Multiple Vulnerabilities

D-Link DVG-N5402SP is susceptible to local file inclusion in products with firmware W1000CN-00, W1000CN-03, or W2000EN-00. A remote attacker can read sensitive information via a .. (dot dot) in the errorpage parameter.

Recent Exploits: