header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Local File Include Vulnerability in Wrapper.php for OsCommerce

The Wrapper.php file in OsCommerce is vulnerable to a local file-include vulnerability. This vulnerability occurs due to inadequate input sanitization. An attacker can exploit this vulnerability by supplying malicious input to the 'file' parameter in the URL. Successful exploitation could allow the attacker to view sensitive files and execute arbitrary local scripts.

vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection

This module exploits a SQL injection vulnerability found in vBulletin 5 that has been used in the wild since March 2013. This module uses the sqli to extract the web application's usernames and hashes. With the retrieved information tries to log into the admin control panel in order to deploy the PHP payload. This module has been tested successfully on VBulletin Version 5.0.0 Beta 13 over an Ubuntu Linux distribution.

EMC Data Protection Advisor DPA Illuminator EJBInvokerServlet Remote Code Execution

The 'DPA Illuminator' service (DPA_Illuminator.exe) listening on public port 8090 (tcp/http) and 8453 (tcp/https) is vulnerable. It exposes the following servlet: http://[host]:8090/invoker/EJBInvokerServlet https://[host]:8453//invoker/EJBInvokerServlet due to a bundled invoker.war. The result is remote code execution with NT AUTHORITYSYSTEM privileges. Proof of concept URL: http://retrogod.altervista.org/9sg_ejb.html https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30211.tgz

Multiple Input Validation Vulnerabilities in Comersus Cart

The Comersus Cart is affected by multiple input validation vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, gain unauthorized access or modify data, and exploit vulnerabilities in the underlying database. Additionally, an attacker can execute arbitrary code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.

FuseTalk SQL Injection Vulnerability

The FuseTalk application is prone to an SQL-injection vulnerability. The vulnerability exists because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Recent Exploits: