header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

D-Link Central WiFiManager Software Controller Multiple Vulnerabilities

Vulnerabilities were found in the Central WiFiManager Software Controller, allowing unauthenticated and authenticated file upload with dangerous type that could lead to remote code execution with system permissions. Also, two stored Cross Site Scripting vulnerabilities were found.

NICO-FTP 3.0.1.19 – Buffer Overflow (SEH)(ASLR)

A buffer overflow vulnerability exists in NICO-FTP 3.0.1.19 which allows an attacker to execute arbitrary code by sending a specially crafted payload to the vulnerable application. The vulnerability is caused due to a boundary error when handling user-supplied input, specifically when handling the 'Sites.conf' file. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted payload to the vulnerable application. Successful exploitation of this vulnerability could result in arbitrary code execution in the context of the application.

FTP Voyager 16.2.0 – Denial of Service (PoC)

A buffer overflow vulnerability exists in FTP Voyager 16.2.0, which could allow an attacker to cause a denial of service condition. The vulnerability is due to improper bounds checking of user-supplied data, which can be exploited by an attacker to cause a stack-based buffer overflow by sending a specially crafted request to the vulnerable application. An attacker can send a specially crafted request containing an overly long string to trigger this vulnerability.

Joomla! Component Jimtawl 2.2.7 – ‘id’ SQL Injection

A SQL injection vulnerability exists in Joomla! Component Jimtawl 2.2.7, which allows an attacker to inject malicious SQL queries via the 'id' parameter in the 'index.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.

Zechat 1.5 – ‘uname’ SQL Injection

Zechat 1.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands. The attacker can also use the 'uname' parameter to inject malicious SQL code into the application. The attacker can then use the make_set() function to extract data from the database.

OPAC EasyWeb Five 5.7 – ‘nome’ SQL Injection

OPAC EasyWeb Five 5.7 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable application. The POST request contains a malicious SQL query in the 'nome' parameter. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.

Recent Exploits: