header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Openfire Persistent & Reflected XSS Vulnerability

This vulnerability allows an attacker to execute arbitrary code by injecting malicious scripts into certain parameters of the Openfire application. The persistent XSS occurs when creating a Group Chat Bookmark or URL Bookmark, while the reflected XSS occurs in the search parameter. The exploit codes provided demonstrate how to inject the payloads and execute the code.

Real player 10 Gold .Ra file remote Dos

A memory leak vulnerability exists in Real Player 10 Gold. This vulnerability can be exploited to cause a denial of service (DoS) condition on the target system. It is important to note that testing this exploit may result in the loss of data, and other applications may fail upon execution.

WordPress: cp-reservation-calendar 1.1.6 SQLi injection

A vulnerability has been detected in the WordPress cp reservation calendar Plugin v1.6. The vulnerability allows remote attackers to inject SQL commands. The sql injection vulnerability is located in the dex_reservations.php file. Remote attackers are able to execute own sql commands by manipulation of requested parameters. The security risk of the sql injection vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 8.6. Exploitation of the remote sql injection web vulnerability requires no user interaction or privilege web-application user account. Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise.

IKEView.exe is vulnerable to local stack based buffer overflow when parsing an malicious (internet key exchange) ".elg" file. Vulnerability causes nSEH & SEH pointer overwrites at 4432 bytes after IKEView parses our malicious file, which may result then result in arbitrary attacker supplied code execution.

EZ SQL Reports < 4.11.37: Arbitrary File Download (admin/colaborator required)

The plugin allows a wordpress site administrator or collaborator to download arbitrary files from the host file system though the plugin functionality of downloading .sql, .sql.zip or .sql.gz files created by the wordpress administrator. The file name to download is not sanitized and path traversal can be injected in the request.

Imageview v5.3 (fileview.php) Local File Inclusion

The vulnerability exists in the fileview.php script of Imageview v5.3. It can be exploited when the magic_quotes_gpc setting is turned off. The issue is caused by not properly sanitizing the user-supplied input in the 'album' parameter, which is used in the require() function. An attacker can exploit this vulnerability to include arbitrary local files and potentially execute malicious code.

TCExam <= 4.0.011 $_COOKIE["SessionUserLang"] shell injection exploit

The TCExam <= 4.0.011 version is vulnerable to shell injection exploit via the $_COOKIE["SessionUserLang"] variable. The vulnerable code is present in the /shared/code/tce_tmx.php file, specifically in lines 92-110. The $language argument is not properly checked for PHP injection. The exploit can be triggered through the /shared/config/tce_config.php file. The TMX class is used in the exploit to instantiate a new TMXResourceBundle object.

Microsoft Internet Explorer 11 Stack Underflow Crash PoC

This exploit causes a stack underflow crash in Microsoft Internet Explorer 11. The vulnerability affects the 32bit version of IE 11, specifically versions 11.0.9600.17843 and 11.0.10240.16431. It has been tested on Windows 7 64bit and Windows 10 (10240) 64bit. The exploit is triggered by executing the 'crash()' function.

Recent Exploits: