header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

In-portal 5.0.3 Remote Arbitrary File Upload Exploit

In-portal 5.0.3 is vulnerable to a remote arbitrary file upload vulnerability. This vulnerability exists due to insufficient validation of user-supplied input in the 'FileUpload' function of the 'commands.php' script. An attacker can exploit this vulnerability to upload arbitrary files to the web server, which can lead to remote code execution. The vulnerable code is located in the 'path/core/editor/editor/filemanager/connectors/php/config.php' and 'path/core/editor/editor/filemanager/connectors/php/commands.php' scripts.

AJ Shopping Cart v1.0 (maincatid) SQL Injection Vulnerability

AJ Shopping Cart v1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin panel by sending a malicious SQL query. The vulnerable parameter is 'maincatid'. An attacker can exploit this vulnerability by sending a malicious SQL query as a value of the 'maincatid' parameter.

AJ Matrix v3.1 (id) Multiple SQL Injection Vulnerability

AJ Matrix DNA is the world's leading MLM software solution for all MLM and affiliate programs. It is vulnerable to multiple SQL injection attacks, which can be exploited to extract sensitive information from the database. The exploit involves sending malicious SQL queries to the vulnerable parameter 'id' in the URL. An attacker can use the 'union' operator to combine the results of two or more SELECT statements into a single result set.

phpGreetCards XSS Vulnerabilities

Multiple XSS possibilities on multiple parameters, e.g. when creating an ecard: index.php?mode=select&category=XX&card[image]=XX&card[sender_name]=~XSS~&card[sender_email]=XX&card[recip_name]=~XSS~&card[recip_email]=XX&card[stamp]=XX&card[bg]=%23B8C2C9&card[font_color]=%23A2ABB1&card[category]=XX&PHPSESSID=XX

Apple iPhone 3.1.2 (7D11) Model MB702LL Mobile Safari Denial-of-Service

A denial-of-service vulnerability exists in Apple iPhone 3.1.2 (7D11) Model MB702LL Mobile Safari due to a stack exhaustion issue. An attacker can exploit this vulnerability by sending a specially crafted HTML page to the target device. This will cause the device to crash and become unresponsive.

CVE-2010-1157: Apache Tomcat information disclosure vulnerability

The 'WWW-Authenticate' header for BASIC and DIGEST authentication includes a realm name. If a <realm-name> element is specified for the application in web.xml it will be used. However, a <realm-name> is not specified then Tomcat will generate one using the code snippet: request.getServerName() + ':' + request.getServerPort() In some circumstances this can expose the local hostname or IP address of the machine running Tomcat.

Windows 2000/XP/2003 win32k.sys SfnINSTRING local kernel Denial of Service Vulnerability

Win32k.sys in DispatchMessage when the last call to xxxDefWindowProc, this function in dealing with some Message, will call gapfnScSendMessage this function table function to process, which under the deal 2000/xp/2003 0x4c No. message, there will be SfnINSTRING function called this function when the lParam is not empty, direct that the lParam is a memory pointer, and pull data directly from the address despite the use of the function of the SEH, but as long as the kernel address transmission errors will still cause the system BSOD.

Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY local kernel Denial of Service Vulnerability

Win32k.sys in DispatchMessage when the last call to xxxDefWindowProc, this function in dealing with some Message, will call gapfnScSendMessage this function table function to process, which under the deal 2000/xp/2003 0x4c No. message, there will be a function called SfnLOGONNOTIFY, this function again when the wParam == 4/13/12 When the data directly from the lParam inside out, despite the use of the function of the SEH, but as long as the kernel passes the wrong address, will still lead to BSOD.

hoagie_openssl_record_of_death.c

The main problem is in ssl/t1_enc.c => tls1_mac() function. There is a NULL pointer dereference => ssl->d1 because d1 is only initialized in ssl/d1_lib.c => dtls1_new(). So if you use SSLv23_server_method() or TLSv1_server_method() this variable will be NULL. If the patch (see http://openssl.org/news/secadv_20100324.txt) is not applied its possible to set the version to DTLS1_BAD_VER (0x100) or DTLS_VERSION (0xfeff) and transmit the packet to the server or client to trigger the vulnerability.

Recent Exploits: