header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Request Forgery in Microsoft Outlook Web Access for Exchange Server 2003

The vulnerability allows a remote attacker to perform actions in the context of an authorized user's session and gain unauthorized access to the affected application. The exploit involves submitting a form with hidden fields that perform certain actions.

SnowFlake CMS SQL Injection Vulnerability

SnowFlake CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

HTML Injection Vulnerability in Sourcefabric Campsite

The Sourcefabric Campsite is vulnerable to HTML injection due to inadequate input sanitization. This vulnerability allows attackers to inject and execute arbitrary HTML and script code within the context of the affected browser. Exploiting this vulnerability could lead to the theft of cookie-based authentication credentials and control over the rendering of the site to the user.

netForo 0.1g(file_to_download)Remote File Disclosure Exploit

This exploit allows an attacker to disclose files on the target system by exploiting the netForo 0.1g vulnerability. By manipulating the 'file_to_download' parameter in the 'down.php' script, an attacker can traverse the file system and access sensitive files such as the '/etc/passwd' file.

Yacs CMS Remote File Include Vulnerability

Yacs CMS is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.

Recent Exploits: