header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Information Disclosure in GeoVision GV-ASManager

An information disclosure vulnerability has been found in the GeoVision GV-ASManager web application with version 6.1.0.0 or lower. This vulnerability allows unauthorized access to sensitive information within the application, such as user accounts and clear text passwords, potentially leading to unauthorized access to monitoring cameras, access cards, and other critical data.

ABB Cylon Aspect 3.08.02 – Cookie User Password Disclosure

The ABB Cylon Aspect version 3.08.02 application is vulnerable to storing sensitive information in clear text within a Cookie. This includes the global parameter, where base64-encoded credentials are stored. By exploiting this vulnerability, a remote attacker can intercept the HTTP Cookie, gaining access to authentication credentials through a man-in-the-middle attack, potentially leading to unauthorized access to user accounts and sensitive data.

SAPGateBreaker Exploit – CVE-2022-22536 – HTTP Request Smuggling Through SAP’s Front Door

The SAPGateBreaker exploit leverages CVE-2022-22536 to perform HTTP Request Smuggling on SAP NetWeaver Application Server. This exploit allows for ACL bypass and internal access through a Content-Length-based technique.

Nagios Log Server 2024R1.3.1 – API Key Exposure

An API-level vulnerability in Nagios Log Server 2024R1.3.1 allows any user with a valid API token to retrieve a full list of user accounts along with their plaintext API keys, including administrator credentials. This flaw enables user enumeration, privilege escalation, and full system compromise via unauthorized use of exposed tokens.

Microsoft Office 2019 MSO Build 1808 – NTLMv2 Hash Disclosure

The exploit involves abusing MS Office URI schemes to fetch a document from a remote source. By invoking a specific URI scheme on a victim computer, an attacker can capture and relay NTLMv2 hash over SMB and HTTP.

ABB Cylon FLXeon 9.3.4 – System Logs Information Disclosure

An authenticated attacker can access critical information via the system logs page of ABB Cylon FLXeon controllers, including the OpenSSL password for stored certificates. This data exposure can lead to potential attacks like decrypting encrypted communications, impersonation, or gaining deeper system access.

Recent Exploits: