header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

KubeBlog XSRF Vuln.

The KubeBlog application is vulnerable to Cross-Site Request Forgery (XSRF) attacks. An attacker can craft a malicious HTML form and submit it to the vulnerable application, which will add a new user with administrator privileges. This can be done without the user's knowledge or consent.

Microsoft Windows SMBv2 Remote Code Execution Vulnerability (MS17-010)

MS17-010 is a critical security update that addresses a vulnerability in Microsoft Server Message Block (SMB) version 1 (SMBv1). The vulnerability is remotely exploitable and allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused by a memory corruption bug in the SMBv1 protocol.

Dr_IDE – All Browsers – Long Unicode DoS PoC

This exploit uses a long Unicode string to cause a denial of service in all browsers. The number of strings increases the amount of memory consumed, quicker crash where applicable. The exploit was tested on Windows 7 and caused a crash reporter in Firefox 3.6.4, hangs in IE 8.0.7600.16385, Opera 10.51, and Safari 4.0.5, and crashes with Gecko, Webkit, and Trident engines in Lunascape6.

Joomla_1.6.0-Alpha2 XSS Vulnerabilities

A vulnerability exists in Joomla 1.6.0-Alpha2 which allows an attacker to inject malicious JavaScript code into the mailto, subject, from, and sender fields of the mailto component. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site when the malicious link is clicked.

Crash Report

This exploit allows an attacker to upload a malicious file to a vulnerable server. The malicious file is then executed on the server, allowing the attacker to gain access to the server. The exploit is triggered by setting the iframe src property to an external document containing the window.print() command. This allows the user to bypass the first print popup.

Recent Exploits: