header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

possible ways to exploit CVE-2012-1663( GNUTLS-3.0.13)

CVE-2013-1663 is a possible remote DOS attack issue. This issue has been fixed in >=GNUTLS-3.0.14. The attacker should try to construct a crafted certificate for triggering the below function fails: ret = gnutls_pubkey_import_x509(pcert->pubkey, crt, 0); if (ret < 0) { gnutls_pubkey_deinit(pcert->pubkey); /* pcert->pubkey should be NULL now */ ret = gnutls_assert_val(ret); goto cleanup; } Two crafted cert files (client.pem, client2.pem) seem to trigger the double free issue in the client's side.

EastFTP ActiveX Control 0Day

An attacker can exploit this vulnerability by creating a malicious HTA file and using the LocalFileWrite method of the FtpLibrary ActiveX control to write the malicious HTA file to the startup folder of the target system. This will cause the malicious HTA file to be executed when the system is restarted.

Vulnerability Report

ViewGit contains multiple persistent arbitrary script injection (XSS) vulnerabilities in its 'Shortlog' and 'Heads' tables. These vulnerabilities are triggered by malicious data inserted via the branch or tag systems of git by one of the users of the repository.

Rebus:list SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a specially crafted SQL query in the 'list_id' parameter. This query will be executed on the server and can be used to extract sensitive information from the database.

Verizon Fios Router CSRF Admin Shell

Verizon Fios Router CSRF Admin Shell is a vulnerability discovered and reported in January 2013 by Jacob Holcomb/Gimppy, a Security Analyst at Independent Security Evaluators. The vulnerability affects the Verizon FIOS Router with Firmware 40.19.36. It allows an attacker to add an administrator user to the router without any password confirmation. The exploit code consists of two HTML files, the first one adds the administrator user and the second one adds the user without any password confirmation.

WordPress Count per Day 3.2.5 CSRF

Count per Day is a WordPress plugin that allows users to track the number of visitors to their website. The plugin is vulnerable to CSRF due to the lack of a CSRF token in the counter.php file. An attacker can craft a malicious request to the counter.php file with a malicious referer, which will be stored in the database. When the admin views the Count per Day - Statistics page, the malicious JavaScript payload will be executed.

WordPress Occasions Plugin 1.0.4 CSRF

You can use the CSRF vulnerability to add/delete Occasions. It is also possible to enter JavaScript in occ_content1 parameter when occ_type1=1. This can be used to execute arbitrary JavaScript in the front-end area (shortcode = [Occasions]). The PoC will add an alert in the front-end area.

WordPress Simply Poll Plugin 1.4.1 CSRF and stored XSS

The WordPress Simply Poll Plugin 1.4.1 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). The question parameter is vulnerable to XSS and the plugin has an CSRF vulnerability (Polls=>Add New). The PoC leads to arbitrary javascript execution in back-end area. An attacker can exploit this vulnerability by sending a link (pointing to the PoC html file) to a logged in admin. When the admin views the Polls the javascript Code will execute.

DaloRadius SQLi / CSRF / XSS

DaloRadius is vulnerable to Cross-Site Request Forgery (CSRF) on all locations, including the Change Admin Password page. An attacker can craft a malicious request to change the administrator password without any security tokens. Additionally, DaloRadius is vulnerable to multiple SQL Injection and XSS vulnerabilities on the acct-ipaddress.php, acct-date.php, and other pages.

Recent Exploits: