header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! Component vWishlist 1.0.1 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component vWishlist 1.0.1. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate or disclose arbitrary data in the back-end database.

Joomla! Component vBizz 1.0.7 – Remote Code Execution

A remote code execution vulnerability exists in Joomla! Component vBizz 1.0.7. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Nagios XI 5.5.6 Remote Code Execution and Privilege Escalation

This code exploits both CVE-2018-15708 and CVE-2018-15710 to pop a root reverse shell. It handles sending a get request, checking if a URL is ok, running a shell command using the PHP file uploaded, and deleting files locally and on the Nagios XI instance.

Microsoft Windows ‘VCF’ or ‘Contact’ File URL Manipulation-Spoof Arbitrary Code Execution Vulnerability — Remote Vector

A vulnerability in Microsoft Windows allows an attacker to execute arbitrary code by manipulating the URL of a VCF or Contact file. This vulnerability affects Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. both x86 and x64 architectures.

Joomla! Component Easy Shop 1.2.3 – Local File Inclusion

Joomla! Component Easy Shop 1.2.3 is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability to read sensitive files from the server. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request to the vulnerable script and read sensitive files from the server.

CloudMe Sync v1.11.2 Buffer Overflow + Egghunt

CloudMe Sync v1.11.2 is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted payload to the vulnerable application. This can result in arbitrary code execution in the context of the application.

SQL Injection in Adianti Framework

The failure allows any ordinary user to enter SQL Injection and take over the administrator account or any other user of the system, by editing the profile itself. The POC involves registering an ordinary user or using the framework standard, accessing the user profile and clicking edit, entering SQL injection in the field name and clicking save, and then going to the login screen and entering the username and password.

Echo Mirage 3.1 Buffer Overflow PoC (Stack Overflow)

A buffer overflow vulnerability exists in Echo Mirage 3.1 (x64) when a maliciously crafted file is opened. An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user. To exploit this vulnerability, an attacker must entice a user to open a maliciously crafted file. The maliciously crafted file must contain a buffer of 24241 A's, 8 B's and 50 C's.

PHP Dashboards NEW 5.8 – Local File Inclusion

A Local File Inclusion (LFI) vulnerability exists in PHP Dashboards NEW 5.8, which allows an attacker to include a file from the local file system of the web server. An attacker can send a specially crafted HTTP request containing an arbitrary file name in the filename parameter to read.php, which will include the file in the output. This can be used to view sensitive files on the web server, such as the /etc/passwd file.

Recent Exploits: