header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OneFileCMS v.1.1.1 Multiple Remote Vulnerabilities

OneFileCMS is vulnerable to Cross Site Scripting (XSS) attacks. An attacker can inject malicious JavaScript code into the 'p' parameter of the onefilecms.php script. This code will be executed in the browser of the victim when they visit the vulnerable page.

EasySiteEdit remote file include

EasySiteEdit is vulnerable to a remote file include vulnerability. This vulnerability exists in the 'sublink.php' file, where the 'langval' parameter is not properly sanitized before being used in an 'include' function. An attacker can exploit this vulnerability by sending a malicious file to the 'langval' parameter, which will be included and executed.

Axis Commerce (E-Commerce System) Stored XSS

XSS can be done using the command input. An example code is given: 'onmouseover=prompt(XSS Code) bad='. An example URL is also given: http://localhost/axis-0.7.0.4/search/result?q='onmouseover=prompt(906764) bad='. Another example URL is given: http://localhost/axis-0.7.0.4/search/result?q='onmouseover=prompt(document.cookie) bad='.

WordPress Brute Force and User Enumeration Utility

This exploit is a utility that can be used to brute force and enumerate valid usernames and passwords on Wordpress websites. It can also bypass the Block-Spam-By-Math-Reloaded security feature.

Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability

This module exploits an authentication bypass vulnerability in login.php. In conjuction with the authentication bypass issue, the 'jlist' parameter in property_box.php can be used to execute arbitrary system commands. This module was tested against Oracle Secure Backup version 10.3.0.1.0

HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution

This module allows remote attackers to place arbitrary files on a users file system by abusing via Directory Traversal attack the 'saveXML' method from the 'XMLSimpleAccessor' class in the HP Easy Printer HPTicketMgr.dll ActiveX Control (HPTicketMgr.dll 2.7.2.0). Code execution can be achieved by first uploading the payload to the remote machine embedded in a vbs file, and then upload another mof file, which enables Windows Management Instrumentation service to execute the vbs. Please note that this module currently only works for Windows before Vista.

phpMyRealty <= v. 1.0.7 SQL Injection Vulnerability

A SQL injection vulnerability exists in phpMyRealty version 1.0.7. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Network Tracker .95 Stored XSS

The application contains a option which allows anyone to create a user. If this option is left enabled an attacker could launch a stored XSS attack against the vulnerable application. Network Tracker does not escape the data entry on the Description and Brand fields of a device. An attacker may enter <script>alert(100);</script> into these fields to cause the exploit.

Recent Exploits: