header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Customer Support System 1.0 – “First Name” & “Last Name” Stored XSS

The Customer Support System 1.0 is vulnerable to stored XSS. An attacker can insert a malicious script in the "First Name" and "Last Name" fields of the user profile, which will be triggered when the user logs in with valid credentials.

Cisco ASA 9.14.1.10 and FTD 6.6.0.1 – Path Traversal (2)

This exploit takes advantage of the CVE-2020-3452 vulnerability in Cisco ASA and FTD software. It allows an attacker to download various files from the target system. The tool provided in the code attempts to download files listed in the 'files' variable. It is recommended to create a separate folder for the output files to avoid confusion when attacking multiple ASA systems.

Jenkins 2.235.3 – ‘X-Forwarded-For’ Stored XSS

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.

Courier Management System 1.0 – ‘ref_no’ SQL Injection

The 'ref_no' parameter in the Courier Management System 1.0 is vulnerable to SQL Injection. By manipulating the 'ref_no' parameter in the request to the '/ajax.php?action=save_branch' page, an attacker can execute arbitrary SQL queries and potentially retrieve sensitive information from the database.

Medical Center Portal Management System 1.0 – Multiple Stored XSS

The Medical Center Portal Management System 1.0 is vulnerable to multiple stored XSS attacks. By injecting malicious scripts into the name and description fields of the 'Add Medical Products' page or the 'Add New Hospital | Pharmacy' page, an attacker can execute arbitrary code whenever a user views the 'Medical Products' page.

PDF Complete 3.5.310.2002 – ‘pdfsvc.exe’ Unquoted Service Path

The PDF Complete version 3.5.310.2002 is vulnerable to an unquoted service path vulnerability. This vulnerability could allow an attacker to gain escalated privileges by placing a malicious executable in the path of the service.

VestaCP 0.9.8-26 – ‘backup’ Information Disclosure

The vulnerability laboratory core research team discovered an insufficient session validation vulnerability in the VestaCP v0.9.8-26 hosting web-application. An attacker can exploit this vulnerability to gain unauthorized access and disclose sensitive information.

Recent Exploits: