header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Aures Booking & POS Terminal – Local Privilege Escalation

The vulnerability laboratory core research team discovered a local kiosk privilege escalation vulnerability in the operating system of the Aures Komet Booking & POS Terminal (Windows 10 IoT Enterprise) used by the german company immergrün franchise gmbh.

Active Super Shop CMS v2.5 – HTML Injection Vulnerabilities

Multiple html injection vulnerabilities have been discovered in the Active Super Shop Multi-vendor CMS v2.5 web-application. The web vulnerability allows remote attackers to inject their own html codes with a persistent vector to manipulate application content. The persistent html injection web vulnerabilities are located in the name, phone, and address parameters of the manage profile and products.

Wifi Soft Unibox Administration 3.0 & 3.1 Login Page – Sql Injection

The Wifi Soft Unibox Administration 3.0 and 3.1 Login Page is vulnerable to SQL Injection, which can lead to unauthorized admin access for attackers. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page and directly sending the input to the backend server and database.

Microsoft Office 365 Version 18.2305.1222.0 – Elevation of Privilege + RCE

The Microsoft Office 365 Version 18.2305.1222.0 app is vulnerable to Elevation of Privilege. The attacker can use this vulnerability to attach a very malicious WORD file in the Outlook app which is a part of Microsoft Office 365 and easily can trick the victim to click on it - opening it and executing a very dangerous shell command, in the background of the local PC. This execution is without downloading this malicious file, and this is a potential problem and a very dangerous case! This can be the end of the victim's PC, it depends on the scenario.

pfSense v2.7.0 – OS Command Injection

This module exploits an authenticated command injection vulnerability in the "restore_rrddata()" function of pfSense prior to version 2.7.0 which allows an authenticated attacker with the "WebCfg - Diagnostics: Backup & Restore" privilege to execute arbitrary operating system commands as the "root" user. This module has been tested successfully on version 2.6.0-RELEASE.

Recent Exploits: