header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Edimax AR-7084GA Router CSRF + Persistent XSS Exploit

This exploit allows an attacker to inject malicious code into the Edimax AR-7084GA Router. The attacker must first get the victim to be logged in and then open a malicious page. The code should be split into parts because the router limits the VIRTUALSVR_Application parameter length. The malicious code is then injected into the router via a POST request to the vulnerable page.

Trigger for ZDI-10-034 by ZSploit.com

The ZSploit Team has discovered a vulnerability in Microsoft Internet Explorer 6.0 and 7.0. The vulnerability is caused due to a boundary error in the handling of DataURL parameters. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.

Advneced Management For Services Sites Remote add admin exploit

This exploit allows an attacker to add an admin user to the Advanced Management For Services Sites (AM4SS) software. The attacker can use the Dork 'trace find it' to locate vulnerable sites and then use the provided HTML code to add an admin user with the username 'admin', email 'admin@demo.net', password '123456' and group '1'.

IncrediMail 2.0 activeX (Authenticate) bof poc

A buffer overflow vulnerability exists in IncrediMail 2.0 activeX control due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application resulting in arbitrary code execution.

SafeSHOP <= 1.5.6 Cross Site Scripting & Multiple Cross Site Request Forgery

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.

Recent Exploits: