header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Airspan AirSpot 5410 version 0.3.4.1 – Remote Code Execution (RCE)

A vulnerability in Airspan AirSpot 5410 version 0.3.4.1-4 and under allows an attacker to execute arbitrary code on the device. This is due to the lack of input validation in the pingDiagnostic.cgi page, which allows an attacker to inject arbitrary commands into the ping command. This can be exploited by sending a specially crafted POST request to the pingDiagnostic.cgi page.

Mobile Mouse 3.6.0.4 – Remote Code Execution (RCE)

A vulnerability in Mobile Mouse 3.6.0.4 allows an attacker to execute arbitrary code on the target system. The vulnerability exists due to an improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. Successful exploitation of this vulnerability could result in arbitrary code execution on the target system.

WordPress Plugin Netroics Blog Posts Grid 1.0 – Stored Cross-Site Scripting (XSS)

WordPress Plugin "Netroics Blog Posts Grid" is prone to a stored cross-site scripting (XSS) vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin "Netroics Blog Posts Grid" version 1.0 is vulnerable; prior versions may also be affected. Login as Editor > Add testimonial > Under Title inject payload below ; parameter (post_title parameter) > Save Draft > Preview the post payload --> user s1"><img src=x onerror=alert(document.cookie)>.gif The draft post can be viewed using other Editor or Admin account and Stored XSS will be triggered.

WordPress Plugin Testimonial Slider and Showcase 2.2.6 – Stored Cross-Site Scripting (XSS)

WordPress Plugin "Testimonial Slider and Showcase" is prone to a cross-site scripting (XSS) vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin "Testimonial Slider and Showcase" version 2.2.6 is vulnerable; prior versions may also be affected. Login as Editor > Add testimonial > Under Title inject payload below ; parameter (post_title parameter) > Save Draft > Preview the post payload --> test"/><img/src="'/onerror=alert(document.cookie)> The draft post can be viewed using the Editor account or Admin account and XSS will be triggered once clicked.

Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)

Feehi CMS 2.1.1 is vulnerable to stored cross-site scripting (XSS). An attacker can inject malicious JavaScript code into the username field of the sign-up form. When a user visits any article page, the malicious code will be triggered and executed.

Recent Exploits: