header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Scripting Vulnerability in Smart Statistics

The Smart Statistics application is vulnerable to a cross-site scripting (XSS) vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the context of an unsuspecting user's browser on the affected site. This can lead to the theft of authentication credentials and enable the attacker to launch further attacks.

D-Link HNAP Request Remote Buffer Overflow

This module exploits an anonymous remote code execution vulnerability on different D-Link devices. The vulnerability is due to a stack-based buffer overflow while handling malicious HTTP POST requests addressed to the HNAP handler. This module has been successfully tested on D-Link DIR-505 in an emulated environment.

News-Letterman 1.1 (eintrag.php) Remote File Include Exploit

This exploit takes advantage of a vulnerability in the News-Letterman 1.1 software, specifically in the 'eintrag.php' file. The vulnerable code includes a user-supplied input file, which can be exploited to include remote files from an attacker-controlled server. This can lead to remote code execution and potential compromise of the target system.

DM Database Server Remote Memory Corruption Vulnerability

The 'CALL SP_DEL_BAK_EXPIRED' function in DM Database Server is vulnerable to remote memory corruption when a large string is passed to the first argument. An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

CMScout Cross-Site Scripting Vulnerability

The CMScout application fails to properly sanitize user-supplied data, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.

Recent Exploits: