header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Amaya Web Editor <= 11.0 Remote Buffer Overflow P0c

Amaya Web Editor version 11.0 and prior is vulnerable to a remote buffer overflow attack. By sending a specially crafted HTML file, an attacker can cause a buffer overflow in the application, resulting in arbitrary code execution. The vulnerability is caused due to a boundary error when handling the 'dir' attribute of the 'bdo' tag. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted HTML file.

Personal Site Manager <= 0.3 Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'upload_file.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious PHP code in it. The malicious code will be uploaded to the vulnerable server and executed.

Google Chrome Web Browser Clickjacking

x0x has discovered a clickjacking vulnerability in Google Chrome Web Browser. The vulnerability is caused due to the application not properly sanitizing user-supplied input. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site by e.g. tricking a user into clicking on a specially crafted link. This can be used to e.g. steal cookie-based authentication credentials.

Amaya web editor XML and HTML parser vulnerabilities

Multiple stack buffer overflow vulnerabilities have been discovered in Amaya, which can be exploited by unauthorized people using crafted web pages to compromise a user's system. A boundary error when processing 'input' HTML tags can be exploited to cause a stack-based buffer overflow via an overly long 'type' parameter (Bugtraq ID 33046). A boundary error when processing 'object' HTML tags can be exploited to cause a stack-based buffer overflow via an overly long 'classid' parameter (Bugtraq ID 33047).

smartSiteCMS 1.0 Blind SQL injection

This exploit is based on a Blind SQL injection vulnerability in the smartSiteCMS 1.0 v1.0. It allows an attacker to extract the password of a given user from the database. The exploit uses a binary search algorithm to guess the characters of the password one by one. The exploit is written in Python and requires the host, path and username as parameters.

Recent Exploits: