header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

dotDefender XSS Vulnerability

dotDefender is prone to a XSS because it doesn't satinate the input vars correctly. Injecting obfusctated JavaScript code based on references vars assignment, the dotDefender WAF is vulnerable. Blocked: [victim]/search?q=%3Cimg%20src=%22WTF%22%20onError=%22{var%20{3:s,2:h,5:a,0:v,4:n,1:e}=%27earltv%27}[self][0][v%2Ba%2Be%2Bs]%28e%2Bs%2Bv%2Bh%2Bn%29%28/0wn3d/.source%29%22%20/%3E Unblocked: [victim]/search?q=%3Cimg%20src=%22WTF%22%20onError=alert(/0wn3d/.source) %20/%3E

Diferior CMS 8.03 Multiple CSRF Vulnerabilities

Diferior CMS 8.03 is vulnerable to multiple CSRF vulnerabilities. An attacker can exploit these vulnerabilities to change the admin password, change the admin email address, and ban a user. The attacker can also change the password and email address of other users by changing the value of the 'cust_user' parameter in the POST request.

ASX to MP3 Converter v3.1.2.1 SEH Exploit (Multiple OS, DEP and ASLR Bypass)

This is a proof of concept that it is possible to write ROP exploits that are portable to different operating systems. This exploit is using the following variables: 1. "Offset": The offset to the SEH overwrite 2. "Offset2": The offset before the ROP code starts in the buffer 3. "K32Offset": The offset to the kernel32 pointer on the stack 4. "VPOffset": The offset to VirtualProtect() from the grabbed kernel32 address 5. "ASLR": Activates or deactivates the ASLR bypassing ROP code The K32Offset and VPOffset are negged hex-numbers, to evade the null-byte problem.

I-net Enquiry management Script SQL Injection Vulnerability

I-net Enquiry mannagement Script has sql injection vulnerability. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. This can be done by manipulating the 'id' parameter in the 'viewaddedenquiry.php' page.

Joomla Component QContacts (com_qcontacts) – SQL Injection Vulnerability

Joomla Component QContacts (com_qcontacts) is vulnerable to SQL Injection. The vulnerable parameters are Itemid, id and catid. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a SQL query in the form of a URL parameter. This can be used to extract sensitive information from the database.

Opera.html

Opera.html is a malicious HTML file that contains a script which triggers an out-of-bounds read vulnerability in Opera. The vulnerability is triggered when the script calls the getImageData() function with a large width and height parameter. This causes the browser to read data outside of the allocated memory, which can lead to a crash or information disclosure.

Corel Presentations X5 15.0.0.357 (shw) Remote Buffer Preoccupation PoC

Corel WordPerfect is prone to a remote buffer overflow vulnerability because the application fails to perform adequate boundary checks on user supplied input with .SHW (Presentations Slide Show) file. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Recent Exploits: