header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

eWebEditor v1.x (WYSIWYG) Remote File Upload

eWebEditor is vulnerable to a remote file upload vulnerability. An attacker can exploit this vulnerability by sending a malicious file to the upload.asp page of the application. The malicious file can be uploaded to the server and can be accessed by appending the malicious file name to the uploads/asp/ directory. This can be used to execute arbitrary code on the server.

hustoj (fckeditor) Remote Arbitrary File Upload Exploit

This vulnerability allows an attacker to upload arbitrary files to the vulnerable server. The vulnerability exists due to insufficient validation of the file extension when uploading files via the FCKeditor file manager. An attacker can exploit this vulnerability by uploading a malicious file with a double extension (e.g. .php.jpg) and then accessing it directly via a web browser.

E-commerce Group (cat.php) SQL Injection Vulnerability

A vulnerability has been discovered in E-commerce Group (cat.php) which allows an attacker to inject malicious SQL commands into the vulnerable application. The vulnerability is due to the user input not being properly sanitized before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. An attacker can exploit this vulnerability to gain access to sensitive information from the database, modify data, or execute system commands.

Online Job Board (Auth Bypass) SQL Injection Vulnerability

A vulnerability exists in the Online Job Board script, which allows an attacker to bypass authentication and gain access to the admin panel. This vulnerability works only when magic_quotes_gpc is set to off. The PoC for this vulnerability is to access the admin panel with the following credentials: Admin ID: ' or '1=1, Password: ' or '1=1.

PR10-03 Authenticated Cross-Site Scripting Vulnerability (XSS) within Apache Axis2 administration console

Axis2 is a web services/SOAP/WDSL engine, widely used within many commercial products Procheckup has found it is vulnerable to a vanilla Cross-Site Scripting Vulnerability (XSS). Axis2 is used within SAP Business Objects 12 and 3com's IMC network management tool.

Recent Exploits: