header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wikidforum Multiple SQL-Injection and Cross-Site Scripting Vulnerabilities

Wikidforum is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Wikidforum Multiple SQL Injection and Cross-Site Scripting Vulnerabilities

Wikidforum is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

TP-LINK TL-WR740N HTML-injection Vulnerability

TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible. To exploit this vulnerability, an attacker can send a specially crafted HTTP request containing malicious HTML or script code to the vulnerable device.

Synology Photo Station Cross-Site Scripting Vulnerability

Synology Photo Station is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

EJBCA Cross-Site Scripting Vulnerability

EJBCA is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

singapore Cross-Site Scripting Vulnerability

singapore is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

phpMyVisites Multiple Cross-Site Scripting Vulnerabilities

phpMyVisites is prone to multiple cross-site scripting vulnerabilities because it fails to sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

SAP Business Objects Cross-Site Scripting Vulnerabilities

SAP Business Objects is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

ShellShock dhclient Bash Environment Variable Command Injection PoC

ShellShock dhclient Bash Environment Variable Command Injection PoC is a proof-of-concept exploit for the ShellShock vulnerability. It uses a malicious DHCP server to inject a malicious command into the environment variables of a vulnerable dhclient. This exploit can be used to execute arbitrary code on the target system.

RealVNC 4.1.0 and 4.1.1 Authentication Bypass Exploit

This exploit is a basic port of hdmoore/msf2 perl version to python for fun and profit (ease of use). It requires vncviewer installed and is tested on Windows XP. It uses a socket to connect to the target VNC service and sends a null authentication option to the client.

Recent Exploits: