header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PodcastGenerator 3.2.9 – Multiple Stored Cross-Site Scripting (XSS)

The PodcastGenerator application version 3.2.9 is vulnerable to multiple instances of stored cross-site scripting (XSS). An attacker can exploit this vulnerability by uploading a malicious file with a crafted title, which will be executed when viewed in the 'View All Episodes' page. This allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser.

Trend Micro OfficeScan Client 10.0 – ACL Service LPE

Versions =< 10.0 of Trend Micro OfficeScan Client contain wrong ACL rights on the OfficeScan client folder, allowing attackers to escalate privileges to the system level through the services. This vulnerability does not require any privileged access.

PaperCut NG/MG 22.0.4 – Remote Code Execution (RCE)

The vulnerability allows an attacker to execute arbitrary code remotely in PaperCut NG/MG version 22.0.4. The exploit involves sending a specially crafted payload to the service 'direct/1/OptionsUserSync/$OptionsUserSource.$Form'. This allows the attacker to gain unauthorized access and execute commands on the affected system.

thrsrossi Millhouse-Project 1.414 – Remote Code Execution

This exploit allows an attacker to execute arbitrary code on the target system by exploiting a vulnerability in thrsrossi Millhouse-Project version 1.414. By sending a specially crafted request to the target's add_post_sql.php file, an attacker can upload a malicious PHP file and execute arbitrary commands on the target system.

PnPSCADA v2.x – Unauthenticated PostgreSQL Injection

This exploit allows an attacker to perform unauthenticated SQL injection in PnPSCADA v2.x. By manipulating the 'userids' parameter in the 'hitlogcsv.isp' endpoint, an attacker can inject malicious SQL queries and potentially gain unauthorized access to the backend database.

Apache Superset 2.0.0 – Authentication Bypass

This exploit allows an attacker to bypass authentication in Apache Superset version 2.0.0. The vulnerability is due to the insecure handling of session cookies, which can be forged by an attacker. By exploiting this vulnerability, an attacker can gain unauthorized access to the Superset instance without valid credentials. The exploit works by decoding the session cookie and forging a new session cookie for a specified user ID. This allows the attacker to impersonate the specified user and gain full access to the Superset instance.

WordPress Plugin Backup Migration 1.2.8 – Unauthenticated Database Backup

The WordPress Plugin Backup Migration 1.2.8 allows unauthenticated users to access and download the database backup files. By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive data.

Recent Exploits: