header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Doorgets CSRF Vulnerability

This vulnerability allows an attacker to change the configuration of the site by sending a malicious request to the server. The proof of concept code provided in the text shows an example of a malicious request that can be sent to the server to change the configuration of the website.

Buffer Overflow Vulnerability Hanso Player version 2.1.0

A buffer overflow vulnerability exists in Hanso Player version 2.1.0. An attacker can exploit this vulnerability by creating a malicious M3U file containing a large amount of junk data and sending it to the target user. When the target user opens the malicious file, the buffer overflow will occur, allowing the attacker to execute arbitrary code on the target system.

Archer.c

Archer.c is a privilege escalation exploit for Linux systems. It works reliably against x86-64 3.3-3.7 architectures. The exploit uses a technique called return-oriented programming (ROP) to bypass non-executable memory protections. It uses the mmap() system call to map a page of memory with read, write, and execute permissions. It then copies a function called patch_current() to the mapped page and uses a loop to overwrite the uid and gid values in the current process. Finally, it calls setuid() to gain root privileges.

WordPress plugin: Comment Rating SQL injection

A SQL injection vulnerability exists in the Wordpress plugin Comment Rating, due to the lack of input validation in the HTTP_X_FORWARDED_FOR header. An attacker can inject malicious SQL code in the header, which can be used to execute arbitrary SQL commands on the underlying database.

Joomla! <= 3.0.2 (highlight.php) PHP Object Injection Vulnerability

User input passed through the 'highlight' parameter is not properly sanitized before being used in an unserialize() call at line 58. This can be exploited to inject arbitrary PHP objects into the application scope. Successful exploitation of this vulnerability doesn't require authentication, but requires the 'System Highlight' plugin to be enabled (such as by default configuration).

Glossword v1.8.8 – 1.8.12 Arbitrary File Upload Vulnerability

This module exploits a file upload vulnerability in Glossword versions 1.8.8 to 1.8.12 when run as a standalone application. This application has an upload feature that allows an authenticated user with administrator roles to upload arbitrary files to the 'gw_temp/a/' directory.

MTP Poll 1.0 Multiple Remote Script Insertion Vulnerabilities

MTP Poll script suffers from multiple stored cross-site scripting vulnerabilities. The issues are triggered when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Recent Exploits: