header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple XSS in Free Simple CMS

High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in Free Simple CMS , which can be exploited to perform cross-site scripting attacks. Input appended to the URL after index.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of affected website. Input passed via the GET "db_themes_background_color_page" parameter to /themes/default/index.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of affected website. Input passed via the GET "include" parameter to index.php (when GET "page" parameter is set to "login" and GET "request" parameter is set to "forgot_password") is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal sequences.

AMHSHOP 3.7.0 SQL Injection

AMHSHOP 3.7.0 is an Arabic Shopping Script that is vulnerable to a SQL Injection vulnerability. An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

MS HyperV Persistent DoS Vulnerability

A security vulnerability was found in the driver 'vmswitch.sys', associated to the Windows Hypervisor subsystem, allowing an authenticated local DoS. The vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. The impact is all guests on that host became non-responsive. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. As a result, an attacker logged with admin privileges on a guest VM may cause: All applications in virtual machines stop responding, The host kernel CPU usage rises up to 100%, The host machine is unable to reboot (It shows the close window but it never performs the host rebooting).

Microsoft Office XP Remote code Execution

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Windows Media Player with klite codec pack DOS Poc

The 3gp handling from MP4Splitter.ax filter of klite codec pack will cause an Access violation when a specially crafted movie file is loaded on the media player. The same crash will occur also when the file is loaded on a playlist and the media player will try to generate thumbnail image of the contents.

Scriptegrator plugin for Joomla! 1.5 0day File Inclusion

A vulnerability in the Scriptegrator plugin for Joomla! 1.5 allows attackers to include arbitrary files from the local system. This is done by sending a specially crafted HTTP request to the vulnerable server, which contains the file path in the request. The vulnerable code is located in the libraries/highslide/css/cssloader.php, libraries/highslide/js/jsloader.php, libraries/jquery/theme/cssloader.php, libraries/jquery/js/jsloader.php, and libraries/jquery/js/ui/jsloader.php files.

Oracle HTTP Server XSS Header Injection

The vulnerability is triggered when a malicious user sends a crafted HTTP request with an Expect header containing malicious JavaScript code. The malicious code is then reflected back in the response page and executed in the context of the vulnerable web application.

Recent Exploits: