header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MaDDash 2.0.2 – Directory Listing

A directory listing is inappropriately exposed, yielding potentially sensitive information to attackers. A directory listing provides an attacker with the complete index of all the resources located inside of the directory. The specific risks and consequences vary depending on which files are listed and accessible.

CVE-2018-0824

A remote code execution vulnerability exists in 'Microsoft COM for Windows' when it fails to properly handle serialized objects. An attacker who successfully exploited the vulnerability could use a specially crafted file or script to perform actions. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability.

Audiograbber 1.83 – Local Buffer Overflow (SEH)

Audiograbber 1.83 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by crafting a malicious file and convincing the user to open it. This will allow the attacker to execute arbitrary code on the vulnerable system.

RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery

A Cross-Site Request Forgery (CSRF) vulnerability exists in RabbitMQ Web Management versions prior to 3.7.6. An attacker can craft a malicious HTML page that, when visited by an authenticated user, will submit a POST request to the /api/users/rootadmin endpoint with the username, password, and tags parameters set to rootadmin, rootadmin, and administrator, respectively. This will create a new administrator user in the RabbitMQ instance.

Joomla!Component jomres 9.11.2 – Cross site request forgery

Joomla! Component jomres 9.11.2 is vulnerable to Cross Site Request Forgery (CSRF). An attacker can craft a malicious HTML page and send it to the victim. When the victim visits the malicious page, the attacker can force the victim to perform unintended actions on the vulnerable website. This can be used to create a new user account with administrative privileges.

Pale Moon Browser < 27.9.3 - Use After Free (PoC)

This exploit is a proof of concept for a Use After Free vulnerability in Pale Moon Browser versions prior to 27.9.3. The vulnerability is triggered when the SetVariable() function is called with a NodeList object as the first argument. This causes a Use After Free condition, which can be used to execute arbitrary code.

Recent Exploits: