header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XXE Vulnerability in SDL Web Content Manager

SDL Web Content Manager build 8.5.0 is vulnerable to XXE vulnerability in SaveUserSettings web service. SaveUserSettings web service takes XML values as a parameter. The webservices allows and accepts XML external entity which allows an attacker to read sensitive files from the server. Moreover it can be used to perform network port scanning to internal network.

Double Your Bitcoin Script Automatic 2018 for $50 – Authentication Bypass

An authentication bypass vulnerability exists in the Double Your Bitcoin Script Automatic 2018 for $50 application. An attacker can exploit this vulnerability by sending a crafted HTTP request with a username and password set to '=''or' to the /admin/index.php page, allowing them to bypass authentication and gain access to the application.

UltraISO 9.7.1.3519 – ‘Output FileName’ Denial of Service (PoC) and Pointer to next SEH and SE handler records overwrite

UltraISO 9.7.1.3519 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a specially crafted file and then convincing a user to open it. This will cause a denial of service condition.

Facebook And Google Reviews System For Businesses 1.1 – Remote Code Execution

An attacker can exploit a vulnerability in Facebook And Google Reviews System For Businesses 1.1 to execute arbitrary code. By sending a specially crafted HTTP POST request, an attacker can inject malicious code into the 'photo' parameter of the 'custom_reviews_add.php' script. This can be exploited to execute arbitrary PHP code on the vulnerable system.

Facebook And Google Reviews System For Businesses 1.1 – SQL Injection

A SQL injection vulnerability exists in Facebook And Google Reviews System For Businesses 1.1, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'campaign_add.php' script.

Angry IP Scanner 3.5.3 Denial of Service (PoC)

A denial of service vulnerability exists in Angry IP Scanner 3.5.3 due to a buffer overflow when copying a large amount of data to the clipboard. An attacker can exploit this vulnerability by running a python code to create a file with a large amount of data, copying the data to the clipboard, and then pasting it into the 'El valor no está disponible (sin resultados):' field in the 'Preferencias' tab of the 'Herramientas' toolbar. This will cause the application to crash.

Facebook And Google Reviews System For Businesses – Cross-Site Request Forgery

An attacker can exploit this vulnerability by crafting a malicious HTML page that contains a form with pre-filled values. When the victim visits the malicious page, the form will be automatically submitted and the attacker can change the password of the admin user.

Exploit for Huawei HG532e Router

This exploit is for Huawei HG532e Router. It is a command injection vulnerability which allows an attacker to execute arbitrary commands on the vulnerable router. The exploit uses the Upgrade service of the router to execute the commands. The exploit is written in Python and uses the requests library to send the malicious payload to the router.

Insecure direct object references (IDOR) in Fortify SSC (Software Security Center) 17.10

Fortify SSC (Software Security Center) 17.10, does not properly check ownership of 'authEntities', which allows remote authenticated (view-only) users to read arbitrary details via API bulk parameter to /api/v1/projectVersions/{NUMBER}/authEntities

Recent Exploits: