header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SAP NetWeaver HostControl Command Injection

This module exploits a command injection vulnerability in the SAPHostControl Service, by sending a specially crafted SOAP request to the management console. In order to deal with the spaces and length limitations, a WebDAV service is created to run an arbitrary payload when accessed as a UNC path. Because of this, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.

Booking System Pro CSRF Vulnerability

This exploit allows an attacker to add an admin user to the Booking System Pro application. The attacker can craft a malicious HTML page that contains a form with hidden fields that contain the admin user credentials. When the victim visits the malicious page, the form is automatically submitted and the admin user is added to the application.

WordPress HD Webplayer 1.1 SQL Injection

The Wordpress HD Webplayer plugin version 1.1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The vulnerability exists in the config.php and playlist.php files, where an attacker can inject malicious SQL code into the 'id' and 'videoid' parameters respectively.

Blog Comments Powered By Disqus <- Sql Injection

SQL Injection vulnerability exists in Blog Comments Powered By Disqus. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. This can allow an attacker to gain access to the database and can also allow an attacker to execute arbitrary code on the server.

Conceptronic Grab’n’Go and Sitecom Storage Center – Password disclosure Vulnerability – Security Advisory AA-002

An attacker can harvest administrator credentials and log into the web management UI. Possibilities include but are not limited to reading and writing files stored on the device and altering the device’s configuration. This means an attacker could steal sensitive data stored on the device, leverage the device to drop and/or host malware, abuse the device to send spam through the victim’s Internet connection, and use the device as a pivot point to access locally connected systems or launch attacks directed to other systems.

RV Shopping cart CSRF Vulnerability

This exploit allows an attacker to add an admin user to the RV Shopping cart application. The attacker can craft a malicious HTML page with a form that contains the necessary parameters to add an admin user. When the victim visits the malicious page, the form is automatically submitted and the admin user is added to the application.

RV Article publisher CSRF Vulnerability

This exploit allows an attacker to add an admin user to the RV Article publisher application. The attacker can craft a malicious HTML page that contains a form with hidden fields that contain the username, email, password, group, active, superadmin, postnote, and save_user values. When the victim visits the malicious page, the form is automatically submitted and the admin user is added to the application.

Express Burn Plus v4.58 EBP Project File Handling Buffer Overflow PoC

The vulnerability is caused due to a boundary error in the processing of a project file, which can be exploited to cause a unicode buffer overflow when a user opens e.g. a specially crafted .EBP file. Successful exploitation could allow execution of arbitrary code on the affected machine.

Recent Exploits: