header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TorrentTrader 2.6 Multiple vulnerabilities

The variable $preview isn't declared in the file blocks-edit.php, so it's exploitable from the url for example. http://localhost/blocks-edit.php?preview=1&name=../../../../../../../etc/passwd%00. Like the variable $name isn't declared, it's exploitable for a XSS from the url. http://localhost/blocks-edit.php?preview=1&name=[XSS]. The variables $description, $addblock, $name and $wantedname aren't declared, so it's exploitable from the url for example. http://localhost/blocks-edit.php?addnew[0]=1&addblock_1=../../../../../../../etc/passwd%00&wantedname_1=../../../../../../../etc/passwd%00&wanteddescription_1=../../../../../../../etc/passwd%00

Digital Music Pad Version 8.2.3.4.8 SEH overflow

A SEH overflow vulnerability exists in Digital Music Pad Version 8.2.3.4.8. An attacker can exploit this vulnerability to execute arbitrary code by sending a specially crafted .pls file. The vulnerability is due to the application not properly validating the length of user-supplied input before copying it to a fixed-length buffer. An attacker can exploit this vulnerability to execute arbitrary code by sending a specially crafted .pls file.

PHP-AddressBook v6.2.4 SQL INJECTION VULNERABILITIES

PHP-AddressBook v6.2.4 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to sensitive information such as the database name, user name, and other information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'group_name' parameter of the 'group.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a maliciously crafted SQL query to the vulnerable server. This can allow the attacker to gain access to sensitive information stored in the database.

BBcode XSS and Path Disclosure in KaiBB

User can execute arbitrary JavaScript code within the vulnerable application. BBcode isn't properly sanitized. This can be used to post arbitrary script code. The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in "f" variable, it's possible to generate an error that will reveal the full path of the script.

News Script PHP Pro (fckeditor) File Upload Vulnerability

A vulnerability in News Script PHP Pro (fckeditor) allows an attacker to upload arbitrary files to the server. The vulnerability exists due to insufficient validation of the file type in the 'uploadtest.html' script. An attacker can upload a malicious file to the server and execute arbitrary code.

DD-WRT Information Disclosure Vulnerability

Remote attackers can gain sensitive information about a DD-WRT router and internal clients, including IP addresses, MAC addresses and host names. This information can be used for further network attacks as well as very accurate MAC address geolocation. This is exploitable even if remote administration is disabled.

Recent Exploits: