header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WirelessFiles v1.1 iPad iPhone – Multiple Web Vulnerabilities

This application starts a web server on your device and allows downloads and uploads of any files from it using any browser on any other computer or device. No cables, drivers or clients are necessary, just a browser. Right from this application you can send these files to any other application ready to accept this file type. Or, you can send the files to Wireless Files for further download to your computer. There is no problems with national file names. With this program You have web access to photos and videos on your device. Show your photos in a nice Web Album on big screen without cables and so on. For that, you need to enter your web-server from any computer using LAN or WWAN address. Just type one of the indicated addresses in the address bar of your browser (Internet Explorer, Mozilla Firefox, Safari or any others). Also, you can start WirelessFiles on one device, enter the web-server in your browser from another device, and transfer your photos,for example,to the first device, and then put them in Camera Roll. (The transfer of photos to and from Camera Roll is available only in iOS 6 and up). For all this to work, you need to have a working connection to the network where your device is located. For LAN,It usually works right on the spot, if you have a modem or Wi-Fi router. If you have an AccessPoint (AP) connected to your modem or router, you will need to switch the AP to the bridge mode in order to join the local network and Wi-Fi network into one. In case you experience problems with connection, contact a specialist – this can be easily adjusted. It’s much harder with WWAN. It’s a network access point provided by your cell network operator.

Vulnerability in Glossword 1.8.12

The Glossword 1.8.12 software is vulnerable to cross-site scripting (XSS) attacks. An attacker can inject malicious scripts into the 'a' parameter of the 'gw_admin.php' file. This can lead to the execution of arbitrary code or the disclosure of sensitive information. Additionally, the software has a vulnerability that allows an attacker to access the database backups, which are stored with insecure permissions. This can result in the unauthorized disclosure of sensitive data. The software is also vulnerable to cross-site request forgery (CSRF) attacks and shell upload attacks.

NaviCOPA Web Server 2.01 0day Remote Buffer Overflow Exploit

This exploit targets NaviCOPA Web Server version 2.01. It utilizes a remote buffer overflow vulnerability to execute arbitrary code on the target system. The exploit has been coded by h07 and has been tested on XP SP2 Polish and 2000 SP4 Polish. By sending a specially crafted buffer, an attacker can gain control of the target system and execute commands remotely.

OpenSSH CRC compensation attack detection DoS PoC

This is a Proof of Concept (PoC) for the OpenSSH CRC compensation attack detection Denial of Service (DoS) vulnerability. The vulnerability allows an attacker to cause a DoS condition on a target system by exploiting a weakness in the CRC compensation feature of OpenSSH. By sending specially crafted packets to the target system, the attacker can trigger a CRC calculation loop that consumes excessive CPU resources and leads to a DoS condition. This PoC script implements the CRC-32 algorithm in bash and can be used to test the vulnerability on a target system.

Internet Explorer 8 & Internet Explorer 9 steal any Cookie

This vulnerability allows an attacker to steal cookies from Internet Explorer 8 and 9. The attacker needs to use the same proxy for HTTP and HTTPS. The risk can be mitigated by changing the configuration. The vulnerability has not been rated as high risk by Microsoft.

Multiple Vulnerabilities in phpWebSite

The phpWebSite application is vulnerable to multiple cross-site scripting, HTML injection, and SQL injection vulnerabilities. The cross-site scripting vulnerability exists in the comments module script, allowing an attacker to execute malicious HTML and script code in the context of a vulnerable user. The SQL injection vulnerability affects the calendar module script, enabling a remote attacker to disclose sensitive information. Additionally, the application is prone to HTML injection in the notes module due to inadequate sanitization of user-supplied data. Attackers can exploit this vulnerability to manipulate web content, perform unauthorized actions on the site, or steal authentication credentials.

HTML injection vulnerability in DasBlog

DasBlog is susceptible to an HTML injection vulnerability in its request log. This vulnerability allows an attacker to inject malicious HTML and script code into the application, which can be executed within the browser of an administrator displaying the 'Activity and Events Viewer' in the context of the vulnerable site. This can lead to the theft of cookie-based authentication credentials and other possible attacks.

Recent Exploits: