header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Subtitles Workshop XSS vulnerabilities

A Cross-Site Scripting (XSS) vulnerability exists in Online Subtitles Workshop due to improper validation of user-supplied input in the 'video_comments.php' script. An attacker can inject malicious HTML or JavaScript code into the 'message' parameter of the 'video_comments.php' script, which will be executed in the browser of any user who views the comments page.

YJ Contact us – Enhanced Joomla Contact Form <= Local File Inclusion Vulnerability

YJ Contact us - Enhanced Joomla Contact Form is vulnerable to a Local File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable application. This can allow the attacker to read arbitrary files from the server.

phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection

This module exploits a vulnerability in the lib/functions.php that allows attackers input parsed directly to the create_function() php function. A patch was issued that uses a whitelist regex expression to check the user supplied input before being parsed to the create_function() call.

BlueZone Desktop Malformed .zmd file Local Denial of Service

A vulnerability in BlueZone Desktop allows a local attacker to cause a denial of service by creating a specially crafted .zmd file. The vulnerability is due to an error when handling a specially crafted .zmd file. An attacker can exploit this vulnerability by creating a specially crafted .zmd file and convincing a user to open it with bzmd.exe. Successful exploitation will cause the application to crash.

BlueZone Desktop Malformed .zft ffeil Local Denial of Service

A denial of service vulnerability exists in BlueZone Secure FTP v5.2C1 Build 1469 due to a malformed .zft file. By creating a file with a specific header and a large amount of junk data, an attacker can cause the program to crash.

zFTP Server “cwd” Remote Denial-of-Service

This exploit is a proof-of-concept for a remote denial-of-service vulnerability in zFTP Server version 2011-04-13 08:59. The vulnerability is triggered by sending a specially crafted CWD command with a long string of asterisks as a parameter. This causes the server to crash.

MS11-077 Win32k Null Pointer De-reference Vulnerability POC

The vulnerability is caused by a NULL pointer dereference in the Windows kernel when handling certain messages sent to a window. An attacker can exploit this vulnerability by sending a specially crafted message to a window, resulting in a denial of service (BSOD).

Recent Exploits: