header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

php4dvd Remote PHP Code Injection Vulnerability

php4dvd is prone to a remote PHP code-injection vulnerability. An attacker can exploit this issue to inject and execute arbitrary PHP code in the context of the affected application. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

Code::Blocks Denial-of-Service Vulnerability

Code::Blocks is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. Due to the nature of this issue, arbitrary code execution may be possible, but this has not been confirmed.

ADIF Log Search widget plugin for WordPress Cross-Site Scripting Vulnerability

ADIF Log Search widget plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Barracuda SSL VPN 680 Open Redirection Vulnerability

Barracuda SSL VPN 680 is prone to an open-redirection vulnerability. An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible.

Matterdaddy Market 1.4.2 File Uploader Fuzzer

Matterdaddy Market is prone to multiple security vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to execute arbitrary script code, upload arbitrary files, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Weyal CMS Multiple SQL Injection Vulnerabilities

Weyal CMS is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

RRDtool Module for Python Format String Vulnerability

The RRDtool module for Python is prone to a format-string vulnerability because it fails to properly sanitize user-supplied input. An attacker may exploit this issue to execute arbitrary code within the context of the affected application or to crash the application.

WP cleanfix Cross-Site Request Forgery Vulnerability

The WP cleanfix plugin for WordPress is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible. SRF PoC - generated by Burp Suite Professional --> <body> <form action="http://www.example.com/wordpress/wordpress-351/wp-admin/admin-ajax.php" method="POST"> <input type="hidden" name="action" value="wpCleanFixAjax" /> <input type="hidden" name="command" value="echo&#32;phpversion&#40;&#41;&#59;" /> <input type="submit" value="Submit request" /> </form> </body> </html>

Recent Exploits: