header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ziepod+ 1.0 Cross Application Scripting

Ziepod/Ziepod+ is vulnerable to cross application scripting when processing an XML subscription. In order to carry about the attack, the attacker must serve the malicious XML file on a web server first and trick the user into adding it to the subscription. Once the XML is automatically loaded, the JavaScript will execute, the attacker is capable of any of the following depending on the browser: 1. Modify the application contents in Ziepod 2. View/transfer/write data on the victim machine 3. Inject malware on the victim machine using, for example, an iframe

MDaemon Mailer Daemon Version 11.0.1 (LATEST) Remote File Disclosure

The latest version at the time of this advisory is vulnerble to the attack. It seems all files which the SYSTEM account can read can be accessed remotely, even accessing files on SMB shares located in the local network might be possible. The caveat is that only human readable files can be read. When subscribing to a mailing list the user sends an E-Mail with a subject like: SUBSCRIBE test-mailinglist@<domainhere>. An attacker can now supply dot dot slashes here to point to a different file as intended.

Wormable Remote Code Execution in PHP-Nuke 7.0/8.1/8.1.35

A vulnerability in PHP-Nuke 7.0/8.1/8.1.35 allows for remote code execution. A blind SQL injection attack is used to bypass AppArmor protection. A malicious user can register a normal account, login, and use a JavaScript command to obtain a user's cookie. The cookie can then be used to set a cookie with admin privileges.

Dr_IDE Firefox 3.6.3 & Safari 4.0.5 window.print() DoS

This exploit is a Denial of Service (DoS) vulnerability in Firefox 3.6.3 and Safari 4.0.5. It is triggered by a malicious JavaScript code that calls the window.print() function. This causes the browser to crash and the user is unable to access the page. The exploit was discovered by Dr_IDE and tested on Firefox 3.6.3 on OSX 10.6.3 and Safari 4.0.5 on OSX 10.6.3.

Dr_IDE – Camino 2.0.2 & Safari 4.0.5 DoS PoC

Dr_IDE discovered a Denial of Service (DoS) vulnerability in Camino 2.0.2 and Safari 4.0.5. The vulnerability is triggered when a user visits a malicious website containing a script that calls the history.go() function in an infinite loop. The impact of the vulnerability is reduced because the user must either have popup blocker off, or accept popups.

WordPress Plugin WP-SlimStat-Ex 3.9.3.1 – Cross-Site Request Forgery (CSRF)

WP-SlimStat-Ex is a WordPress plugin that allows users to track their website's traffic. The plugin is vulnerable to Cross-Site Request Forgery (CSRF) attacks, which can be used to perform administrative actions on behalf of the user. An attacker can exploit this vulnerability by tricking a logged-in administrator into clicking a malicious link. This can be used to delete all the data collected by the plugin, or to add a new administrator account.

Beyond Compare 3.0.13 b9599 (.zip) 0day Stack Buffer Overflow PoC exploit

This is a proof-of-concept exploit for a stack buffer overflow vulnerability in Beyond Compare 3.0.13 b9599 (.zip). The vulnerability is triggered when a maliciously crafted .zip file is opened, which causes a buffer overflow and allows arbitrary code execution. The exploit code creates a malicious .zip file containing a shellcode and padding, which is then used to overwrite the SEH and NSEH registers.

Recent Exploits: