header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NooMS CMS version 1.1.1 CSRF

A Cross-Site Request Forgery (CSRF) vulnerability exists in NooMS CMS version 1.1.1. An attacker can craft a malicious HTML page that contains a form with hidden fields that when submitted, will modify the settings of the NooMS CMS. The form contains fields for the admin username, admin password, site name, site URL, number of results per page, language, and theme. An attacker can modify these settings without the knowledge of the administrator.

SQL Injection and XSS in Viscacha

The vulnerability exists due to failure in the 'editprofile.php' and 'admin.php' scripts to properly sanitize user-supplied input. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. User can execute arbitrary JavaScript code within the vulnerable application. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

HTB22916 & HTB22917

The vulnerability exists due to failure in the 'users/edituser.php' script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: <form action='http://host/users/edituser.php?id=USERID&action=update' method='post' name='main'><input type='hidden' name='un' value='test'><input type='hidden' name='unOld' value='test'><input type='hidden' name='fn' value='test'><input type='hidden' name='tit' value='test'><input type='hidden' name='em' value='email (at) example (dot) com [email concealed]'><input type='hidden' name='pw' value=''><input type='hidden' name='pwa' value=''><input type='hidden' name='perm' value='5'><input type='hidden' name='Save' value='Save'></form><script>document.main.submit();</script> User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the 'projects/viewprojectsite.php' script to properly sanitize user-supplied input. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/projects/viewprojectsite.php?id=PROJECTID&action=add&task=1&title=<script>alert(document.cookie)</script>

S40 CMS 0.4.2 Beta Local File Inclusion

S40 CMS is prone to Local File Inclusion vulnerability because of poor security checks and bad input sanitization: GET variables are not properly sanitized before being included via require() PHP function. Having a quick look at page() function, the security issue is clear: $pid ($_GET['p']), is not sanitized or passed through a valid regular expression before being returned to require() function of index.php file.

GreenPants 0.1.7 Multiple Vulnerabilities

GreenPants 0.1.7 is vulnerable to multiple SQL Injections. The vulnerable files are indexheader.php, searcher.php, indexviewentry.php, editcat.php and editemot.php. An attacker can exploit these vulnerabilities by sending malicious input to the vulnerable parameters. For example, http://localhost/greenpants/index.php?id=-99 UNION SELECT VERSION() can be used to exploit the vulnerability in indexheader.php.

eyeOS 2.3 Local File Inclusion and Reflected Cross-site Scripting Vulnerabilities

A local file inclusion vulnerability in eyeOS 2.3 can be exploited to include arbitrary files. A reflected cross-site scripting vulnerability in eyeOS 2.3 can be exploited to execute arbitrary JavaScript.

Dream Vision Technologies SQL Injection Vulnerability

The vulnerability exists in the Dream Vision Technologies Pvt Ltd web application. An attacker can exploit the vulnerability by sending malicious SQL queries to the vulnerable parameter in the URL. For example, http://site.com/product.php?sid=[SQLI] or http://site.com/detail.php?id=[SQLI]

Mplayer BOF + ROP Exploit

This exploit is based on a buffer overflow vulnerability in Mplayer Lite 33064. It uses a shellcode to execute a command (calc.exe) and a return-oriented programming technique to bypass the non-executable stack protection. It has been tested on Windows 7 x64 and does not work on 32 bit without heavy modification of offsets.

Recent Exploits: