header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! JE Ajax Event Calender Component SQL Injection Vulnerability

A SQL injection vulnerability exists in Joomla! JE Ajax Event Calender Component. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. The vulnerability is due to insufficient sanitization of user-supplied input in the 'event_id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This will allow the attacker to gain access to the database and extract sensitive information.

A Design Flaw in Windows Kernel API can Lead to privilege escalation

A design flaw in Windows Kernel API can lead to privilege escalation. After running the PoC, typing “whoami” in command prompt will show the escalated user credentials. All actions this PoC performs require only user privilege, but result in arbitrary kernel mode code execution due to the ambiguous design of RtlQueryRegistryValues. This design flaw exists in most versions of Windows kernels, yet no patch or documentation is publicly available on this issue.

‘WSN Links’ SQL Injection Vulnerability (CVE-2010-4006)

A vulnerability exists in the search.php code that allows for SQL injection of various parameters. By assembling portions of SQL code between the affected parameters, successful SQL injection into the software can occur. In the testing done, various 'UNION SELECT' SQL injections can occur.

Administrative Credentials Disclosure

phpvidz does not use a SQL database. Instead it uses a system of flat files to maintain application state. The administrative password is stored within the following file and is included during runtime. Because this file has a .inc extension it is viewable by the attacker. To exploit this issue visit this url: http://localhost/phpvidz_0.9.5/includes/init.inc By default the password is the following constant: define ('ADMINPASSWORD' , '0000' ); This password can be used to login here (A username is not required): http://localhost/phpvidz_0.9.5/admin.php

phpmotion/FCKeditor File upload vulnerabilities

By default, the vulnerable application can be accessed at http://127.0.0.1/. An attacker can exploit this vulnerability by accessing the URL http://127.0.0.1/phpmotion/fckeditor/editor/filemanager/connectors/test.html, which will allow them to upload a file to the server. The uploaded file can then be accessed at http://127.0.0.1/userfiles/name of file.

ImageShack Toolbar 4.8.3.75 Remote Code Execution Exploit

ImageShack Toolbar 4.8.3.75 is vulnerable to a remote code execution exploit. The exploit involves setting two vulnerable variables to some integer, which is then stored (in hex) directly in ECX. The attacker then sprays the heap and puts something useful in ECX. This exploit is not marked safe for scripting, so the impact of this issue is small.

Xion Audio Player 1.0.126 (.m3u8) Buffer Overflow Vulnerability

Xion Audio Player 1.0.126 is vulnerable to a buffer overflow vulnerability when a specially crafted .m3u8 file is opened. The vulnerability is caused due to a boundary error when copying user-supplied data into a fixed-length buffer. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted .m3u8 file.

Acidcat CMS v 3.x (fckeditor) Shell Upload Vulnerability

A vulnerability in Acidcat CMS v 3.3 (fckeditor) allows an attacker to upload a malicious ASP shell by renaming it to .asp;.jpg. The shell can be uploaded to the server via the 'fckeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/asp/connector.asp' URL. The shell can be uploaded to the 'read_write/file/' or 'public/File/' directories.

Recent Exploits: