header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dbltek GoIP – Local File Inclusion

Dbltek GoIP-1 is a VoIP-GSM gateway device, which allows making calls and sending SMS messages using SIP. The device has a webserver that contains two pre-auth Local File Inclusion vulnerabilities. Using these, it is possible to download the device configuration file containing all device credentials (including admin panel credentials and SIP credentials) if the configuration file has been backed up.

Cyclades Serial Console Server 3.3.0 – Local Privilege Escalation

The software ships with overly permissive sudo privileges for any user in the admin group, or the default admin user. This vulnerability exists in all legacy versions of the software - the last version being from ~2014. This vulnerability does not exist in the newer distributions of the ACS Software.

Thinfinity VirtualUI 2.5.26.2 – Information Disclosure

It is possible to induce an application to interact with an arbitrary external service. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the webserver or increase the attack surface (it may be used also to filtrate the real IP behind a CDN). An example of the HTTP request is given in the text.

Thinfinity VirtualUI 2.5.41.0 – IFRAME Injection

By accessing the following payload (URL) an attacker could iframe any external website (of course, only external endpoints that allows being iframed). The vulnerable vector is "https://example.com/lab.html?vpath=//wikipedia.com" where "vpath=//" is the pointer to the external site to be iframed.

WordPress Plugin Perfect Survey – 1.5.1 – SQLi (Unauthenticated)

The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.

HMA VPN 5.3 – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

File Sanitizer for HP ProtectTools 5.0.1.3 – ‘HPFSService’ Unquoted Service Path

The vulnerability exists due to an unquoted service path in the HPFSService service. A local attacker can exploit this vulnerability to gain elevated privileges on the affected system.

Recent Exploits: