header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ReQlogic v11.3 – Reflected Cross-Site Scripting (XSS)

ReQlogic v11.3 is vulnerable to Reflected Cross-Site Scripting (XSS). An attacker can exploit this vulnerability by sending a malicious payload to the POBatch and WaitDuration parameters. The malicious payload is triggered when the user visits the URL with the malicious payload.

Moodle LMS 4.0 – Cross-Site Scripting (XSS)

A Cross Site Scripting (XSS) vulnerability exists in Moodle is a free and open-source Learning Management System (LMS) written in PHP and distributed under the GNU General Public License. Vulnerable Code: line 111 in file "course/search.php" echo $courserenderer->search_courses($searchcriteria); Steps to exploit: 1) Go to http://localhost/course/search.php 2) Insert your payload in the "search" Proof of concept (Poc): The following payload will allow you to run the javascript - "><img src=# onerror=alert(document.cookie)>

X-Skipper-Proxy v0.13.237 – Server Side Request Forgery (SSRF)

Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.

BoxBilling<=4.22.1.5 – Remote Code Execution (RCE)

BoxBilling was vulnerable to Unrestricted File Upload. In order to exploit the vulnerability, an attacker must have a valid authenticated session as admin on the CMS. With at least 1 order of product an attacker can upload malicious file to hidden API endpoint that contain a webshell and get RCE

SugarSync 4.1.3 – ‘SugarSync Service’ Unquoted Service Path

SugarSync installs a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

HDD Health 4.2.0.112 – ‘HDDHealth’ Unquoted Service Path

HDD Health installs a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

Recent Exploits: