header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MySQL Squid Access Report 2.1.4 Multiple Vulnerabilities

SQL injection and Cross site script vulnerabilities are found on ALL parameter of MySAR. An example of a SQL injection attack is http://server/mysar/index.php?a=IPSummary&date=[SQLi], and an example of a Cross Site Scripting attack is http://server/mysar/index.php?a=IPSummary&date=2018-04-14"><script>alert(1)</script>

Windows GDI Bitmap Out-of-Bounds Read/Write Vulnerability

This vulnerability allows an attacker to read and write out-of-bounds memory in Windows GDI Bitmap objects. The vulnerability is caused by the lack of proper bounds checking when accessing the bitmap object. An attacker can exploit this vulnerability by creating a malicious bitmap object and then accessing memory outside of the bounds of the object. This can lead to information disclosure, privilege escalation, and other malicious activities.

Brave Browser < 0.13.0 Denial of Service (resource consumption) via a long alert() argument.

A denial of service vulnerability exists in Brave Browser versions prior to 0.13.0 due to a long alert() argument. An attacker can exploit this vulnerability by creating a malicious HTML page with a long alert() argument, which when opened in Brave Browser will cause the browser to consume large amounts of resources and eventually crash.

D-Link DIR-615 Wireless Router – Persistent Cross Site Scripting (XSS)

A vulnerability in D-Link DIR-615 Wireless Router allows an attacker to inject malicious JavaScript code into the router's web interface. This code is then executed in the context of the router's web server, allowing the attacker to perform various malicious activities such as stealing session cookies, redirecting users to malicious websites, etc. The vulnerability exists due to insufficient input validation of the user-supplied data in the router's web interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router's web interface.

Ultra MiniHTTPd 1.2 – ‘GET’ Remote Stack Buffer Overflow

A buffer overflow vulnerability exists in Ultra MiniHTTPd 1.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability can be exploited remotely via a specially crafted HTTP GET request.

Recent Exploits: