header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Subrion CMS 4.2.1 – Stored Cross-Site Scripting (XSS)

The Subrion CMS version 4.2.1 is vulnerable to stored cross-site scripting (XSS). An attacker can inject malicious code into the tooltip value of the field add page, which will be executed when a user views the page. This can lead to various attacks, such as stealing sensitive information or performing actions on behalf of the user.

Label Studio 1.5.0 – Authenticated Server Side Request Forgery (SSRF)

Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF.

Tapo C310 RTSP server v1.3.0- Unauthorised Video Stream Access

These Tapo cameras work via an app. There is a facility on the app to set up a “Camera Account”, which adds user details for the RTSP server. Unfortunately if you don’t set up the user details on versions 1.3.0 and below there are default login details. I sourced these from the “cet” binary on the camera.You can gain unauthorised access to the RTSP stream using the following user details:User: ---Password: TPL075526460603

YouPHPTube <= 7.8 - Multiple Vulnerabilities

YouPHPTube v7.8 allows unauthenticated directory traversal and Local File Inclusion through the parameter in an /?lang=PATH+TRAVERSAL+FILE (without php) GET request. It also has a reflected Cross-Site Scripting (XSS) vulnerability.

Tftpd32_SE 4.60 – ‘Tftpd32_svc’ Unquoted Service Path

The Tftpd32_SE 4.60 software on Microsoft Windows 10 Home 64 bits is vulnerable to an unquoted service path vulnerability. This can allow an attacker to escalate privileges by placing a malicious executable in the path. The vulnerability was discovered by Ismael Nava.

Recent Exploits: