header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

P-News V² – (user.txt) Information Disclosure Vulnerability

P-News V² is vulnerable to an information disclosure vulnerability. The vulnerability exists due to the application failing to properly sanitize user-supplied input. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to view the contents of the user.txt file, which contains sensitive information.

A.I-Pifou Directory-Traversal Vulnerability

A.I-Pifou is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

DotNetNuke HTML-injection Vulnerability

DotNetNuke is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code may execute in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to users; other attacks are also possible.

Multiple Remote File-Include Vulnerabilities in Redblog Application

The redblog application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

0-day Songbird Media Player <= 0.2 Format String Denial Of Service PoC

Songbird Media Player and lower experiance a format string conversion error when attempting to parse out malformed M3U Playlist files in which extended ascii exists in any field. The problem seems to originate in the unicode coverter which kicks into effect when extended ascii is present in a M3U file. It can even cause a huge spike in CPU Resources, a few times mine flatlined at 99% after exploit and required a system reboot. I don't have the time to try to turn this into an exploit, but i've seen it overwrite EIP with some values - the string is getting converted to unicode prior to the error. And sometimes EIP gets randomly overwritten with values, and sometimes the application just crashes. For me using this exploit EIP gets overwritten with 0x35382534 = '58%4' sometimes its 0x3f3f3f3f and sometimes its 0xfffffff3. I noticed removing a file extension from the exploit causes EIP to get overwritten more frequently.

Neon WebMail Multiple Input Validation Vulnerabilities

Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. An attacker can exploit these issues to compromise the affected application. Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.

Multiple Input Validation Vulnerabilities in Neon WebMail

Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. An attacker can exploit these issues to compromise the affected application. Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.

eSyndiCat Cross-Site Scripting Vulnerability

eSyndiCat is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input data. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: