header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Acc Auto Dealer Script [ Persistent XSS / SQL backup ]

Acc Auto Dealer Script is vulnerable to persistent XSS and SQL Backup. An attacker can inject malicious JavaScript code into the Description field of the user profile, which will be executed when the site admin visits the user profile. Additionally, the attacker can access the SQL backup file which contains user credentials.

ZeeCareers v2x – PHP HR Manager Website [ XSS / Auth Bypass ]

ZeeCareers v2x is vulnerable to XSS and Auth Bypass. An attacker can inject malicious JavaScript code into the 'title' parameter of the 'basic_search_result.php' page. Additionally, the 'editprofile.php', 'forgot.php', 'additionalfeatures.php', 'employer_reg.php' pages are vulnerable to Auth Bypass.

Mozilla Codesighs Memory Corruption PoC

This exploit is a proof-of-concept for a memory corruption vulnerability in Mozilla Codesighs. The vulnerability is caused by a lack of proper input validation when parsing a line of text from a file. This can be exploited to execute arbitrary code by supplying a specially crafted line of text. The vulnerability is triggered when the program attempts to scan the line of text using the sscanf() function.

Miniweb 2.0 Full Path Disclosure

The value of the module parameter passed to index.php page is included using the PHP main function. This may be a principle of local file inclusion vulnerability but in this case the final NULL byte is properly sanitised. However an invalid module name produces a warning message with the full path of the interested page.

Millenium MP3 Studio 2.0 (PLS File) Stack Overflow

This module exploits a stack-based buffer overflow in the Millenium MP3 Studio 2.0. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Millenium MP3 Studio. This functionality has not been tested in this module.

Recent Exploits: