header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows Skype Client URI Handler Vulnerability

The Windows Skype client implements two URI handlers, Skype: and Skype-Plugin. Both handlers allow for easy browser integration and are supported by all modern browsers. When a Skype link is clicked, the Skype.exe process is spawned with the /URI: command argument, followed by the user specified phone number or contact name. Due to a flaw in the current user input validation performed by Skype, it is possible to append additional command line arguments which are subsequently processed during the launch of Skype.exe. Security-Assessment.com found that the /Datapath argument can be included and directed to a remote SMB share directly through the Skype URI handler. The Datapath argument specifies where the Skype configuration files and security policy is kept. Specifying a Datapath argument will override any local security policy defined in the Windows registry. This allows a remote user to control the Skype configuration and security policy of the local client instance of Skype. Settings such as a remote proxy can be

Joomla com_products ‘intCategoryId’ Remote Sql Injection Vulnerability

A remote SQL injection vulnerability exists in Joomla com_products component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.

Eros Erotik Webkatalog start.php (rubrik&id)SQL Injection

A SQL injection vulnerability exists in the Eros Erotik Webkatalog start.php script, which allows an attacker to execute arbitrary SQL commands via the 'go' and 'id' parameters. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information such as usernames, passwords, and emails stored in the database.

Joomla com_about Remote Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable Joomla application. The request contains a malicious SQL query in the 'id' parameter of the 'com_about' component. This can allow the attacker to extract information from the database, such as usernames, passwords, and emails.

Recent Exploits: