header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple SQL Injection Vulnerabilities in Forritun

Forritun is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Multiple Information Disclosure Vulnerabilities in BackWPup Plugin for WordPress

The BackWPup plugin for WordPress is prone to multiple information-disclosure vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to retrieve the contents of an arbitrary file. Information obtained may aid in launching further attacks.

Mercur Messaging 2005 SP3 IMAP service – Egghunter mod

The exploit allows for injecting a buffer of more than 2000 bytes using an IMAP command, specifically the LIST command. This buffer is then used to execute an egghunter which locates the shellcode in memory and executes it. The exploit also includes a bindshell payload that listens on port 4444.

Overly Trusted Location Variant Method Cache Vulnerability

This vulnerability allows for arbitrary code execution and crashing of Internet Explorer. It can be triggered by visiting a malicious website. The exploit attempts to inject JavaScript code into the browser, causing it to crash. The vulnerability is unstable and may not always successfully execute the exploit.

KMPlayer ‘Skins’ Buffer Overflow Vulnerability

KMPlayer is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

CCH Wolters Kluwer PFX Engagement <= v7.1 Local Privilege Escalation

The PFX services for engagement install with LOCAL SYSTEM service credentials in the directory C:PFX Engagement. The executables that are installed, by default, allow AUTHENTICATED USERS to modify, replace or alter the file. This would allow an attacker to inject their code or replace the executable and have it run in the context of the system. This would allow complete compromise of a machine on which it was installed, giving the process LOCAL SYSTEM access to the machine in question. An attacker can replace the file or append code to the executable, reboot the system or restart the service and it would then compromise the machine. As LOCAL SYSTEM is the highest privilege level on a machine, this allows total control and access to all parts of the system. This affects both the server and workstation builds.

Cross-Site Scripting in YT-Audio Plugin for WordPress

The YT-Audio plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting vulnerability in ComicPress Manager plugin for WordPress

The ComicPress Manager plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: