header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GLPI Cartography Plugin v6.0.0 – Unauthenticated Remote Code Execution (RCE)

The GLPI Cartography Plugin version 6.0.0 is vulnerable to unauthenticated remote code execution. By sending a specially crafted HTTP POST request to the 'upload.php' file, an attacker can execute arbitrary code on the target system. This vulnerability has been assigned CVE-2022-34128.

GLPI Activity v3.1.0 – Authenticated Local File Inclusion on Activity plugin

The GLPI Activity plugin version 3.1.0 and earlier is vulnerable to an authenticated local file inclusion vulnerability. An attacker can exploit this vulnerability to read arbitrary files from the target system.

GLPI Glpiinventory v1.0.1 – Unauthenticated Local File Inclusion

The GLPI Glpiinventory plugin version 1.0.1 is vulnerable to unauthenticated local file inclusion. An attacker can exploit this vulnerability to read arbitrary files from the server.

GLPI 4.0.2 – Unauthenticated Local File Inclusion on Manageentities plugin

The GLPI Manageentities plugin version 4.0.2 and below is vulnerable to unauthenticated local file inclusion. An attacker can exploit this vulnerability by sending a specially crafted request to the `cri.class.php` file, allowing them to access arbitrary files on the system.

Roxy WI v6.1.1.0 – Unauthenticated Remote Code Execution (RCE) via ssl_cert Upload

The Roxy WI v6.1.1.0 application is vulnerable to unauthenticated remote code execution (RCE) via ssl_cert upload. An attacker can exploit this vulnerability by uploading a malicious ssl_cert file, which can lead to remote code execution.

Art Gallery Management System Project v1.0 – SQL Injection (cid) Unauthenticated

An SQL injection vulnerability exists in Art Gallery Management System Project v1.0. By inserting a single quote (') or a double single quote ('') in the 'cid' parameter, an attacker can manipulate the SQL query and gain unauthorized access to the database.

Art Gallery Management System Project v1.0 – Reflected Cross-Site Scripting (XSS)

This exploit allows an attacker to inject malicious code into a web application, which is then executed by the victim's browser. In this specific case, the vulnerability exists in the 'artname' parameter of the 'product.php' page. By inserting a crafted XSS payload, an attacker can trigger the execution of arbitrary JavaScript code on the victim's browser.

Microsoft Exchange Active Directory Topology 15.02.1118.007 – ‘Service MSExchangeADTopology’ Unquoted Service Path

The 'Service MSExchangeADTopology' in Microsoft Exchange Active Directory Topology version 15.02.1118.007 has an unquoted service path vulnerability. This allows an attacker with local access to escalate privileges by placing a malicious executable in a directory higher in the search order than the legitimate executable.

LookStrike Lan Manager v0.9 RemoteLocal File Inclusion

LookStrike Lan Manager v0.9 has a remote/local file inclusion vulnerability in multiple files. These files include: modulesclassTable.php, modulesclassdbdb_admins.php, modulesclassdbdb_alert.php, modulesclassdbdb_double.php, modulesclassdbdb_games.php, modulesclassdbdb_matches.php, modulesclassdbdb_match_teams.php, modulesclassdbdb_news.php, modulesclassdbdb_platform.php, modulesclassdbdb_players.php, modulesclassdbdb_server_group.php, modulesclassdbdb_server_ip.php, modulesclassdbdb_teams.php, modulesclassdbdb_team_players.php, modulesclassdbdb_tournaments.php, modulesclassdbdb_tournament_teams.php, modulesclassdbdb_trees.php, modulesclasstournamentMatch.php, modulesclasstournamentMatchTeam.php, modulesclasstournamentRule.php, modulesclasstournamentRuleBuilder.php, modulesclasstournamentRulePool.php, modulesclasstournamentRuleSingle.php, modulesclasstournamentRuleTree.php, modulesclasstournamentTournament.php, modulesclasstournamentTournamentTeam.php, modulesclasstournamentTree.php, and modulesclasstournamentTreeSingle.php. These files can be exploited using the variable "sys_conf[path][real]".

Recent Exploits: