header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASPilot Pilot Cart 7.3 multiple vulnerabilities

Input passed via the "article" parameter to pilot.asp and kb.asp is not properly sanitised before being used in a SQL query. Input passed via the "specific" parameter to cart.asp is not properly sanitised before being used in a SQL query. Input passed via the "countrycode" parameter to contact.asp is not properly sanitised before being used in a SQL query. Input passed via the "srch" parameter to search.asp is not properly sanitised before being used in a SQL query. Input passed to the "countrycode" parameter in contact.asp is not properly sanitised before being returned to the user. Input passed to the "USERNAME" parameter in gateway.asp and cart.asp is not properly sanitised before being returned to the user. Input passed to the "specific" parameter in quote.asp and buyitnow.asp is not properly sanitised before being returned to the user.

Joomla Component com_ckforms

A vulnerability exists in Joomla Component com_ckforms which allows an attacker to perform a Local File Inclusion (LFI) attack. The attacker can send a specially crafted HTTP request to the vulnerable application in order to include a file from the local system. This can be exploited to gain access to sensitive information such as system and application files.

phpCow v2.1 File Inclusion Vulnerability

phpCow v2.1 is vulnerable to a file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can allow the attacker to include a remote file containing arbitrary code, resulting in arbitrary code execution on the server.

Fermitter Server FTP Directory Traversal

Acritum Femitter HTTP-FTP Server is an easy-to use HTTP and FTP server application for Windows which allows you to use your own computer for sharing gigabytes of files with your friends and colleagues. No need to pay for expensive hosting! No need to spend hours to upload your files to a remote server!

RSform! 1.0.5 (Joomla) Multiple Vulnerabilities

RSform! 1.0.5 (Joomla) is vulnerable to Local File Include and SQL Injection. The Local File Include vulnerability can be exploited by appending '?option=com_forme〈=../../../../../../../../../etc/passwd%00' to the URL. The SQL Injection vulnerability can be exploited by appending '?option=com_forme〈=-1' union select benchmark(1000000,md5(1)) -- ' to the URL. RSform! Pro is not affected.

Zeeways Adserver Multiple Vulnerabilities

Multiple scripts with multiple parameters are affected from this vulnerability. Example #1: index.php?section=redir&affid=0&kid=0&zid=[SQL Injection]. Example #2: Visit the 'register' page index.php?section=user&action=register and enter your SQLi string into the email field. Fill out the other fields with some normal stuff (like test) and view your result. Visit the 'register' page index.php?section=user&action=register and enter your CSRF string into the email field. Fill out the other fields with some normal stuff (like test) and view your result. Visit index.php?section=doc&action= and fill out the action parameter. Example: index.php?section=doc&action=test. Visit index.php?section=doc&action=test and play around with both the section and action parameters. You will notice that a local file inclusion is not possible, but you will get an interesting error message.

MassMirror Uploader RFI Vulnerability

A Remote File Inclusion (RFI) vulnerability exists in MassMirror Uploader, which allows an attacker to include a remote file containing malicious code, resulting in arbitrary code execution on the vulnerable server. The vulnerability is due to insufficient sanitization of user-supplied input to the 'GLOBALS[MM_ROOT_DIRECTORY]' parameter in 'example_1.php'. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

Test Exploit Page

This exploit is a buffer overflow vulnerability in LEADThumbLib.LEADThumb ActiveX control (lttmb11n.ocx) which allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when handling the 'BrowseDir' method. By passing a specially crafted argument to the 'BrowseDir' method, an attacker can cause a stack-based buffer overflow, resulting in the execution of arbitrary code.

Recent Exploits: