header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sharetronix CMS XSRF Vulnerability

This exploit takes advantage of a cross-site request forgery (XSRF) vulnerability in Sharetronix CMS version 3.6.2. By tricking a user into visiting a malicious website, an attacker can perform actions on behalf of the victim without their consent or knowledge. In this specific exploit, the attacker submits a form with hidden fields that contain malicious code to the target Sharetronix CMS installation, causing it to execute the code and display an alert box.

Use-After-Free in CrossSite Class

The CrossSite class is used for passing JavaScript variables across different contexts. Chakra is trying to wrap every variable being passed from one context to another to prevent unexpected behaviors like Use-After-Free. However, there is a bug in the code that allows fetching the 'opt' function from a different context without it being wrapped, leading to Use-After-Free vulnerability.

Multiple XSS Oracle WebCenter Sites (FatWire Content Server) 7.x < 11gR1

The backend of the Content Server is prone to permanent and reflected Cross-Site Scripting attacks. The vulnerability can be used to include HTML- or JavaScript code to the affected web page. The code is executed in the browser of users if they visit the manipulated site. The vulnerability can be used to change the contents of the displayed site, redirect to other sites or steal user credentials. Additionally, Portal users are potential victims of browser exploits and JavaScript Trojans.

Expanded Calendar 2.x (PHP-Fusion module) User pass disclosure exploit

This exploit allows an attacker to disclose the user password and username by injecting SQL queries. The vulnerability is located in the /infusions/calendar_events_panel/show_single.php file on line 27. The vulnerability is unpatched and can be exploited by sending a specially crafted HTTP request. The exploit requires the site URL, path, and user ID as input parameters.

EDraw Office Viewer Component 5.3 “FtpDownloadFile()” Remote BoF

The EDraw Office Viewer Component 5.3 is vulnerable to a remote Buffer Overflow in the "FtpDownloadFile()" function. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable component, leading to arbitrary code execution.

SKT LTE Wi-Fi SDT-CW3B1 – Unauthorized Admin Credential Change

Using the directory of /admin/management.shtml, it is possible to access directly System Management without authentication. The attacker has the right to change User ID, Password for General User, User ID, and Password for Admin.

Recent Exploits: