header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Huski Retail SQL Injection Vulnerabilities

Huski Retail is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

LANDesk Management Gateway Cross-Site Request Forgery and Cross-Site Scripting Vulnerabilities

An attacker can exploit the cross-site request forgery issue to alter the settings on affected devices. This may lead to further network-based attacks, including command-injection attacks to the device's underlying operating system, which can lead to a complete compromise of a vulnerable device. The attacker can exploit the cross-site scripting issue to execute arbitrary script code in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials. Other attacks are also possible.

DBMS_JVM_EXP_PERMS 10gR2, 11gR1/R2 OS Command Execution

This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows any user with create session privilege to grant themselves java IO privileges. Identified by David Litchfield. Works on 10g R2, 11g R1 and R2 (Windows only)

FlashGameScript Remote Command Execution Vulnerability

The vulnerability exists in the index.php file of the FlashGameScript application. It allows an attacker to execute arbitrary commands by manipulating the 'func' parameter in a GET request. This can be exploited by sending a malicious link with the 'func' parameter pointing to an attacker-controlled script.

Recent Exploits: