header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! Component AllVideos Reloaded 1.2.x – SQL Injection

Joomla! Component AllVideos Reloaded 1.2.x is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database, potentially allowing them to access or modify sensitive data.

Joomla! Component Aist <= 2.0 - SQL Injection

AIST is implemented as a component for the content management system CMS Joomla! 1.5. and is a subsystem of the website of the center (service) to promote the employment of graduates or an educational institution. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'id' in the 'index.php' script. This can allow the attacker to access sensitive information from the database.

Joomla! Component Advertisement Board 3.1.0 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component Advertisement Board 3.1.0. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the affected parameter. This can be exploited to disclose the contents of the back-end database.

Joomla! Component SIGE version <= 3.2.3 Cross-site Scripting

Kubik-Rubik Simple Image Gallery Extended (SIGE) contains an XSS in the 'print.php' file. Insufficient sanitization of the 'caption' URL parameter allows injection of Javascript into the page. In versions <= 3.2.0 the 'name' and 'img' parameters are vulnerable as well.

Epic Systems Corporation MyChart X-Path Injection

The MyChart software contains an X-Path injection due to the lack of sanitization for the GE parameter 'topic'. A remote attacker can access contents of an XML document containing static display strings, such as field labels, via the topic parameter to help.asp.

ABRT raceabrt Privilege Escalation

A race condition allows local users to change ownership of arbitrary files (CVE-2015-3315). This module uses a symlink attack on '/var/tmp/abrt/*/maps' to change the ownership of /etc/passwd, then adds a new user with UID=0 GID=0 to gain root privileges. Winning the race could take a few minutes.

Edge JIT Process Vulnerability

A vulnerability in Microsoft Edge's JIT process allows an attacker to execute arbitrary native code in the content process. This is achieved by predicting the address on which the JIT process will call VirtualAllocEx() and then allocating a writable memory region on the same address and writing an executable payload there. When the JIT process calls VirtualAllocEx(), the memory protection is set to PAGE_EXECUTE_READ.

Recent Exploits: