header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Autodesk MapGuide Viewer ActiveX(MGAXCTRL.DLL)Overflow Vulnerability

A buffer overflow vulnerability exists in Autodesk MapGuide Viewer ActiveX (MGAXCTRL.DLL) when handling a specially crafted Property Let LayersViewWidth As Long request. An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user.

apps dompdf RFI Vulnerability

A vulnerability exists in apps dompdf, which allows a remote attacker to include a file from a remote location, due to insufficient sanitization of user-supplied input to the 'input_file' parameter. An attacker can exploit this vulnerability to include a malicious file from a remote location and execute arbitrary code on the vulnerable system.

mBlogger v1.0.04 (viewpost.php) SQL Injection Exploit

mBlogger v1.0.04 is vulnerable to a SQL injection vulnerability due to improper sanitization of user-supplied input in the 'postID' parameter of the 'viewpost.php' script. An attacker can exploit this vulnerability to extract sensitive information from the database, such as usernames and passwords.

Joomla Component JE FAQ Pro : Multiple Remote Blind Sql Injection

A vulnerability exists in JE FAQ Pro version 1.5.0 which allows an attacker to inject malicious SQL queries via the 'catid' parameter in the 'index.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation could result in the disclosure of sensitive information from the database.

File Disclosure Vulnerability in Joomla Component Picsell

A vulnerability in the Joomla component Picsell allows an attacker to disclose sensitive files from the server. By manipulating the 'dflink' parameter in the 'task=dwnfree' request, an attacker can access arbitrary files on the server. This vulnerability affects versions prior to 1.0.2.

QuickTime Plugin for Internet Explorer Vulnerability

A buffer overflow vulnerability exists in the QuickTime Plugin for Internet Explorer due to improper bounds checking of user-supplied data. An attacker can exploit this vulnerability by enticing a victim into visiting a specially crafted webpage. The attacker's payload will be executed under the context of the browser.

seagull-0.6.7 <===remote file inclode

Seagull is a web application framework written in PHP. A remote file inclusion vulnerability exists in Seagull version 0.6.7. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Recent Exploits: