header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress aspose-doc-exporter Plugin Arbitrary File Download Vulnerability

The vulnerability allows an attacker to download arbitrary files from the target system by exploiting a flaw in the aspose-doc-exporter plugin for Wordpress. By manipulating the 'file' parameter in the vulnerable PHP script, an attacker can traverse directories and download sensitive files.

XOOPS Module PopnupBlog <= 2.52 (postid) BLIND SQL Injection Exploit

This exploit allows an attacker to perform blind SQL injection in the XOOPS Module PopnupBlog version 2.52 or lower. The vulnerability is present in the 'postid' parameter of the 'index.php' file. By manipulating the 'postid' parameter, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database.

HP Mercury Quality Center runQuery exploit

This exploit allows an attacker to run arbitrary SQL queries on the backend database of HP Mercury Quality Center without using SQL injection. The vulnerability is caused by the ability of the client to execute the "RunQuery" command. The exploit program is written to perform this command. The backend database can be MSSQLServer or Oracle, which determines the types of SQL queries that can be sent. This is a blind SQL attack, but it may be possible to extract data somehow.

Windows .ANI LoadAniIcon Stack Overflow For Hardware DEP XP SP2

A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to take complete control of an affected system. This issue is due to a stack overflow error within the "LoadAniIcon()" [user32.dll] function when rendering cursors, animated cursors or icons with a malformed header, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a malicious web page or viewing an email message containing a specially crafted ANI file.

.ANI (RIFF Cursors) 2007 universal exploit generator

This exploit allows an attacker to execute arbitrary code on a target system by exploiting a vulnerability in the way Microsoft Internet Explorer handles .ANI (RIFF Cursors) files. It was tested on MS Internet Explorer 6.x-7.x on Windows XP SP2 and Windows Vista.

QNAP admin shell via Bash Environment Variable Code Injection

This module allows you to spawn a remote admin shell (utelnetd) on a QNAP device via Bash Environment Variable Code Injection. Affected products: All Turbo NAS models except TS-100, TS-101, TS-200

Recent Exploits: