header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CCMS Exploit

This Perl script allows an attacker to exploit the CCMS v3.1 Demo PW vulnerability to obtain the MD5 hash of a remote user's password. The attacker needs to provide the target site, path, and user ID. The script sends a GET request to the target URL and uses a union-based SQL injection to extract the password hash from the user table. If successful, the script prints the user ID and MD5 hash.

MSI Packages Symbolic Links Processing – Windows 10 Privilege Escalation

An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.

BOOTP Turbo 2.0.1214 – ‘BOOTP Turbo’ Unquoted Service Path

The BOOTP Turbo software version 2.0.1214 is vulnerable to an unquoted service path vulnerability. This vulnerability could allow an attacker to escalate privileges by placing a malicious executable in the system's PATH environment variable.

WordPress Plugin Strong Testimonials 2.40.0 – Persistent Cross-Site Scripting

The custom[client_name] and custom[company_name] parameters in the client details section of Strong Testimonials plugin in WordPress are vulnerable to stored cross-site scripting (XSS). This allows an attacker to execute malicious code on affected websites. The payload in custom[client_name] also gets executed in the All Testimonials page.

Recent Exploits: