header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Novell GroupWise WebAccess Multiple Security Vulnerabilities

An attacker may leverage these issues to bypass certain security restrictions or conduct cross-site scripting attacks. The exploit code extracts the session token from the current document's URI and uses it to inject an iframe that changes the user's signature on the fly.

Advanced Poll 2.0.0 >= 2.0.5-dev textfile RCE

This exploit allows an attacker to execute arbitrary code on a target system running Advanced Poll version 2.0.0 to 2.0.5-dev. The vulnerability is due to a lack of input validation in the 'tpl[display_head.html]' parameter, which can be manipulated to execute system commands. By injecting a command into the 'tpl[display_head.html]' parameter and sending a specially crafted request to the target server, an attacker can execute arbitrary code with the privileges of the web server.

Sendmail Heap-based Buffer Overflow Vulnerability

Sendmail is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer. Successfully exploiting this issue may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.

HP Laser Jet Persistent Javascript Cross Site Scripting via PJL

This script infects all pages on HP laserjets which include ews_functions.js by appending javascript to the ews_functions.js file by leveraging the PJL Directory Traversal.

phpCC Beta <= 4.2 (nickpage.php npid) Remote SQL Injection Exploit

This exploit targets the phpCC Beta version 4.2 and utilizes a SQL injection vulnerability in the 'nickpage.php' file. By manipulating the 'npid' parameter, an attacker can inject malicious SQL queries and retrieve sensitive information from the 'userdata' table.

Recent Exploits: