header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Papoo CMS: Authenticated Arbitrary Code Execution

The Papoo CMS allows authenticated users to upload GIF, JPG and PNG images if they have the "upload images" privilege, which is true for all default groups that can access the administrative interface. The CMS checks the uploaded images only for their header, but not for the file extension. It is therefore possible to upload images with the file extension ".php" and a valid image header. By embedding PHP code into the image (e.g. by using the GIF comments field), arbitrary code can be executed when requesting the image.

Joomla <=1.0.15 Component com_pms <=2.0.4 (Ignore-List) SQL-Injection Vuln

This exploit targets a vulnerability in the com_pms component of Joomla versions <= 1.0.15. The vulnerability allows an attacker to perform SQL injection attacks. The exploit requires a valid account on the target Joomla site with Community Builder Suite 1.1.0 installed. The attacker needs to copy the cookie information of a logged-in user and modify the User-Agent header of the POST request to match the browser used to log in. The exploit can be executed by running the provided script. If successful, the attacker can access the ignore list of the target site and view usernames and passwords.

jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow

This exploit targets the jetAudio software version 7.1.9.4030 plus vx. It utilizes a RET - Universal method to trigger a local stack overflow vulnerability. The exploit has been tested on Windows XP SP3 En. The exploit was written by corelanc0d3r and can be found at http://www.milw0rm.com/exploits/9359. The payload is prepared by creating a malicious .m3u file named 'c0d3rsploit.m3u'. The exploit includes a shellcode that executes a calc command.

Recent Exploits: