header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Discuz! Multiple Cross-Site Scripting Vulnerabilities

The Discuz! forum software is prone to multiple cross-site scripting vulnerabilities. These vulnerabilities occur due to insufficient sanitization of user-supplied data. An attacker can exploit these vulnerabilities to execute arbitrary script code in the context of an unsuspecting user's browser. This can lead to the theft of authentication credentials and the possibility of launching further attacks.

Cross-Site Scripting Vulnerability in VisionGate

The VisionGate application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially stealing authentication credentials and launching further attacks.

VirtuaNews Pro Cross-Site Scripting Vulnerability

VirtuaNews Pro is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting Vulnerability in PHPCart

PHPCart is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Magic News Plus Cross-Site Scripting Vulnerability

Magic News Plus is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting and Security Bypass in SendStudio (Email Marketer)

An attacker can execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and gain unauthorized administrative access to the affected application.

HP Release Control Authenticated XXE

This module take advantage of three separate vulnerabilities in order to read an arbitrary text file from the file system with the privileges of the web server. You must be authenticated, but can be unprivileged since a privilege escalation vulnerability is used. Tested against HP Release Control 9.20.0000, Build 395 installed with demo data. The first vulnerability allows an unprivileged authenticated user to list the current users, their IDs, and even their password hashes. Can't login with hashes, but the ID is useful in the second vulnerability. When a user changes their password, they post the ID of the user who is going to have their password changed. Just replace it with the admin ID and you change the admin password. You are now admin. The third vulnerability is an XXE in the dashboard XML import mechanism. This is what allows you to read the file from the file system. This module is super ghetto half because it was an AMF application, half because I worked on it longer than I wanted to.

FTP Voyager <= 14.0.0.3 CWD Remote Stack Overflow

There is a remote stack overflow in FTP Voyager triggered by a long 257 response. After that, if the user hits <abort>, it causes a stack overflow. This vulnerability only results in a denial of service (DoS) and does not allow for code execution.

SafeNet Sentinel Protection Server 7.0 – 7.4 and Sentinel Keys Server 1.0.3 – 1.0.4 Directory Traversal

This script exploits a directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys Server 1.0.3 - 1.0.4. It allows an attacker to download sensitive files from the target Windows machine, such as registry hives, boot.ini, and win.ini.

Recent Exploits: