header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BlackBerry Device Software Cross-Domain Information Disclosure Vulnerability

The BlackBerry Device Software is prone to a cross-domain information-disclosure vulnerability because the application's web browser fails to properly enforce the same-origin policy. An attacker can exploit this issue to access local files or content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks.

PHP 5 Rejected Session ID Double Free Exploit

This is a proof of concept code from the Hardened-PHP Project that demonstrates a double free vulnerability in PHP 5. It allows an attacker to execute arbitrary code by exploiting a memory corruption issue in the session ID handling. The exploit includes a Linux x86 bindshell on port 4444 from Metasploit.

Cross-Site Scripting Vulnerability in SurgeMail

SurgeMail is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Multiple Vulnerabilities in Intellicom Netbiter webSCADA

The Intellicom Netbiter webSCADA products are prone to multiple remote security vulnerabilities, including a directory-traversal vulnerability, an information-disclosure vulnerability, and an arbitrary-file-upload vulnerability. An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or obtain sensitive data that can aid in further attacks.

HTML-injection vulnerability in Pluck

Pluck is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

PHP 5 session_regenerate_id() Double Free Exploit

This is a proof of concept code from the Hardened-PHP Project that demonstrates a double free exploit in the PHP 5 session_regenerate_id() function. The exploit allows an attacker to execute arbitrary code on a vulnerable system. The exploit includes a Linux x86 bindshell on port 4444 from Metasploit.

Cross-site scripting vulnerability in GetSimple CMS

The GetSimple CMS is prone to a cross-site scripting vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially leading to the theft of authentication credentials and other malicious activities.

Recent Exploits: