header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nodez 4.6.1.1 Mercury (possibly prior versions) multiple vulnerabilities

The 'op', 'bop', 'ext', 'eop' arguments are not properly sanitized before including files from local resources, allowing for arbitrary file inclusion. The 'ext' argument can be used to inject PHP code into the 'cache/ext/statman/log.gtdat' file and execute commands. Additionally, the 'list.gtdat' file in the 'cache/users' folder exposes the MD5 password hashes of all admin and users. This can be exploited by crafting a specific value for the 'upass' parameter.

Ignition 1.3 Remote Code Execution Exploit

The Ignition 1.3 version is vulnerable to remote code execution. Attackers can overwrite the settings.php file by sending a specially crafted POST request and injecting malicious code into one of the variables. This allows attackers to execute arbitrary commands on the target server.

QuickTime PictureViewer 7.6.6 JP2000 DoS

This exploit causes a Denial of Service (DoS) and an Access Violation Exception in QuickTime PictureViewer 7.6.6. The exploit file is a JP2000 file with the MD5 hash B2859391D32DBBFCE00FD2F641863954.

joomla com_idoblog /SQL injection Vulnerability

This exploit allows an attacker to inject SQL code into the com_idoblog component of Joomla. By manipulating the 'userid' parameter, the attacker can execute arbitrary SQL queries on the database. The result of the query is then displayed on the website, potentially exposing sensitive information such as usernames, passwords, and email addresses of the Joomla users.

Recent Exploits: