header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

pixelpost_v1.7.3 Multiple vulnerabilities

The software version 1.7.3 of pixelpost is vulnerable to stored XSS and CSRF attacks. The 'Image Title' and 'tags' parameters in the admin login page are vulnerable to stored XSS. An attacker can inject malicious code, such as <script>alert('sweet')</script>, to execute arbitrary JavaScript code. Additionally, the admin password change functionality is vulnerable to CSRF. An attacker can change the admin password by sending a crafted request to the 'options' endpoint.

PHP MicroCMS 1.0.1 Multiple Remote Vulnerabilities

This CMS has an authentication bypass vulnerability with SQL Injection in the login page. The user_name and password parameters received from the login form are passed to the do_login function, where they are then passed to the get_account_information function without any validation. These parameters are directly applied in an SQL query, allowing an attacker to bypass authentication and potentially gain unauthorized access.

Adobe Acrobat and Reader “pushstring” Memory Corruption

This exploit is for Adobe Acrobat and Reader. It takes advantage of a memory corruption vulnerability in the software. The specific vulnerability is related to the "pushstring" function. This exploit allows an attacker to execute arbitrary code on a target system. The impact of this vulnerability is considered to be medium to high.

Microsoft Office Visio DXF File Stack based Overflow

This exploit takes advantage of a stack-based overflow vulnerability in Microsoft Office Visio 2002 (xp) when parsing DXF files. By specially crafting a DXF file, an attacker can overwrite the EIP register and control the execution flow of the program. This exploit includes a modified alphanumeric shellcode that executes the calc.exe program.

ColdGen – coldcalender v2.06 Remote 0day SQL Injection Exploit

This exploit targets the ColdCalender v2.06 application, specifically the index.cfm file which is vulnerable to SQL Injection. The exploit assumes that the target has a MSSQL backend. It allows an attacker to execute arbitrary SQL queries and retrieve sensitive information from the database. The exploit also identifies the version of the database, the hostname, the database user, and the database name.

Recent Exploits: