header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wireshark 1.2.5 LWRES getaddrbyname stack-based buffer overflow

A stack-based buffer overflow vulnerability exists in Wireshark 1.2.5 due to improper bounds checking of the LWRES getaddrbyname request. An attacker can send a specially crafted LWRES getaddrbyname request to trigger a stack-based buffer overflow, resulting in arbitrary code execution.

Katalog Stron Hurricane Multiple Vulnerability RFI / SQL

The vulnerability exists due to the inclusion of user-supplied data in the includes_directory parameter of the 'moderation.php' script without proper sanitization. This can be exploited to include arbitrary files from remote web servers and execute arbitrary SQL commands via the 'get' parameter of the 'index.php' script.

Snakespc Vulnerability

This exploit allows an attacker to inject malicious SQL code into the vulnerable application. The malicious code is then executed by the application, allowing the attacker to gain access to sensitive data such as usernames and passwords. The vulnerable application in this case is the Joomla component "Videos" which is vulnerable to SQL injection. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application. The request contains a malicious SQL statement which is then executed by the application.

Joomla (jw_allvideos Plugin) Remote File Download Vulnerability

A vulnerability in the Joomla jw_allvideos plugin allows an attacker to download arbitrary files from the server. This is due to the lack of input validation in the download.php file, which allows an attacker to craft a malicious URL and download any file from the server.

Mambo com_akogallery Remote Sql Injection Vulnerability

This vulnerability allows an attacker to inject malicious SQL commands into the vulnerable application. The vulnerable parameter is the ‘id’ parameter in the ‘com_akogallery’ component. By manipulating the ‘id’ parameter, an attacker can inject arbitrary SQL commands into the application. This vulnerability affects Mambo versions 4.6.2 and earlier.

ShortCMS SQL Injection

ShortCMS is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries to view, add, modify, or delete records in the back-end database. This may result in the disclosure or manipulation of sensitive data, or the unauthorized manipulation of application data.

Calendarix: SQL injection

Calendarix is vulnerable to SQL injection. The vulnerability exists in the 'cal_day.php' script, when the 'op' and 'catview' parameters are not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability to gain access to the application and the underlying database.

Recent Exploits: