header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Explay CMS <= 2.1 Persistent XSS and CSRF

This CMS has bad anti-XSS filter that cut only some basic vectors. The loginned user can inject persistent XSS by adding to article text or comment <img src="http://google.com" onerror="alert(document.cookie)" />. User can get admin rights if admin open malicious page that contain, for instance: <img src="http://explay.localhost/admin.php?name=users&page=1&order=user_id&set_admin=2" /> or merely insert it to comment or article text.

easyLink V1.1.0 (detail.php) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability was discovered in easyLink V1.1.0 (detail.php). An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server, which contains malicious SQL statements in the 'act' and 'cat' parameters. This can allow the attacker to gain access to sensitive information from the database, such as user credentials.

fhttpd 0.4.2 – ‘Basic’ Authorization Buffer Overflow

A buffer overflow vulnerability exists in fhttpd 0.4.2 when handling 'Basic' Authorization. An attacker can send a specially crafted 'Basic' Authorization header with a large amount of data, which can cause a stack-based buffer overflow. This can allow an attacker to execute arbitrary code in the context of the application.

NuMedia Soft NMS DVD Burning SDK Activex (NMSDVDX.dll) remote exploit

The NuMedia Soft NMS DVD Burning SDK Activex (NMSDVDX.dll) is vulnerable to a remote code execution vulnerability. An attacker can use the “EnableLog” method to overwrite a specified file and the “LogMessage” one to write new lines on it. Through the Help and Support Center and the pluggable “hcp://” protocol, the attacker can launch their file. The Help Center will host the page with elevated privileges, allowing the page to script arbitrary controls with no prompts presented to the user.

AssetMan v2.5-b SQL Injection using Session Fixation Attack

By exploiting this vulnerability, an attacker may conduct a session fixation attack. In a session fixation attack, the attacker fixes the user's session ID before the user even logs into the target server, thereby eliminating the need to obtain the user's session ID afterwards.

jokes script Remote SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL queries into the vulnerable application. The vulnerable parameter is the 'id' parameter which is not properly sanitized before being used in a SQL query. By exploiting this vulnerability, an attacker can gain access to the application's database and potentially gain access to sensitive information.

ProArcadeScript v1.3 Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in ProArcadeScript v1.3. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to unauthorized information. This can be exploited to gain access to the database and execute arbitrary SQL commands.

Recent Exploits: