header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ActiveX hpqutil!ListFiles hpqutil.dll – Remote heap overflow

The hpqutil.dll in HP All-in-One Series Web Release and HP Photo & Imaging Gallery version 1.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap overflow) via a crafted web page with an ActiveX control that triggers a heap overflow, as demonstrated by a call to the FindFile function.

JBlog ver 1.0

The JBlog ver 1.0 script is vulnerable to remote SQL injection. An attacker can use the 'id' parameter in the index.php and modifpost.php files to inject SQL queries, allowing them to retrieve sensitive information from the database. The exploit sends a GET request with a specially crafted 'id' parameter to retrieve the login and password of the admin user from the 'auteur' table. The password is hashed with the MD5 algorithm.

Vulnerabilities in IDERA Uptime Monitor version 7.8

IDERA Uptime Monitor 7.8 is affected by multiple SQL injection vulnerabilities. User controlled data is included in SQL queries made by the application without first being properly sanitized. As a result, a remote unauthenticated user can inject arbitrary SQL queries into the application’s back-end database. The SQL injection vulnerability is located in β€œ/gadgets/definitions/uptime.CapacityWhatIfGadget/getmetrics.php”.

Ajax File Browser 3 Beta Remote File Inclusion

The vulnerability exists in the _includes/settings.inc.php file of Ajax File Browser 3 Beta. The code on line 12 includes a file using the require_once function without properly sanitizing user input. An attacker can exploit this vulnerability by providing a malicious URL in the 'approot' parameter, leading to remote file inclusion.

Crash vulnerability in K7 Total Security

The user controlled input to K7Sentry device is not properly sanitized, allowing an attacker to compare an arbitrary memory address with a fixed value and read the content of arbitrary memory. By sending an invalid kernel pointer, the attacker can crash the K7 Total Security process.

Vulnerabilities in iB-WRA150N devices

The iB-WRA150N devices have hard coded accounts with default usernames and passwords. This allows an attacker to gain unauthorized access to the device. Additionally, the devices are vulnerable to remote command execution due to insufficient input filtering in the ping test arguments on the Diagnostics page. An attacker can inject arbitrary commands and retrieve sensitive files such as the /etc/passwd file.

Recent Exploits: