header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FortiOS <= 5.6.0 Multiple XSS Vulnerabilities

Affected FortiNet products include FortiOS versions 5.4.0 to 5.6.0, FortiOS versions upto 5.6.0, and FortiOS versions upto 5.6.0. An XSS vulnerability was discovered in the WEB UI - Applications URL, which could be exploited by sending a malicious HTTP request. The request contained a malicious onmouseover attribute, which triggered an alert box when the user hovered over the element. The vendor has released a patch to upgrade to FortiOS version 5.6.1.

Joomla Component ccnewsletter 2.1.9 – ‘sbid’ Parameter SQL Injection

Joomla Component ccnewsletter 2.1.9 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'sbid' in the URL. This can be exploited using boolean-based blind, time-based blind and UNION query techniques.

Friends in War Make or Break 1.7 – Unauthenticated admin password change

Friends in War Make or Break 1.7 is vulnerable to an unauthenticated admin password change. An attacker can exploit this vulnerability by sending a malicious POST request to the pass_edit.php script with the username parameter set to 1 and the password parameter set to the desired new password. This will allow the attacker to change the admin password without authentication.

LNK Remote Code Execution Vulnerability

This module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain a dynamic icon, loaded from a malicious DLL. This vulnerability is a variant of MS15-020 (CVE-2015-0096). The created LNK file is similar except in an additional SpecialFolderDataBlock is included. The folder ID set in this SpecialFolderDataBlock is set to the Control Panel. This is enought to bypass the CPL whitelist. This bypass can be used to trick Windows into loading an arbitrary DLL file.

Friends in War Make or Break 1.7 SQL Injection

The vulnerability exists due to insufficient filtration of user-supplied data in 'username' and 'catid' parameters of 'useruploads.php' and 'index.php' scripts. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive data. The attack can be performed without authentication.

Ads Pro Plugin – Multi-Purpose WordPress Advertising Manager <= v3.4 - Stored XSS / SQLi

Multiple Stored XSS vulnerabilities were found in the Ad Title and Ad Description parameters of the Front End Order Form. The payload will execute when the ad is displayed. Blind SQL Injection was found on the bsa_pro_id parameter, with payloads of AND boolean-based blind - WHERE or HAVING clause and MySQL >= 5.0.12 AND time-based blind.

Recent Exploits: