header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FS-S3900-24T4S Privilege Escalation

This exploit allows an attacker to gain access to the FS-S3900-24T4S device by using the telnet protocol. The attacker can use the guest credentials to login and then use the enable command with the super password to gain access to the device. The attacker can then configure the device to create a new user with admin privileges and no password.

OpenEMR v7.0.1 – Authentication credentials brute force

OpenEMR <= 7.0.1 is vulnerable to authentication credentials brute force attack. An attacker can bypass the authentication mitigation by using a brute force attack to guess the username and password of the application. This exploit uses a python script to perform the attack.

PHPFusion 9.10.30 – Stored Cross-Site Scripting (XSS)

A stored XSS vulnerability exists in PHPFusion 9.10.30. An attacker can upload a malicious SVG file containing a JavaScript payload to the Fusion file manager, which will be executed when the file is accessed. This can be used to steal cookies, session tokens, or other sensitive information.

SoftExpert (SE) Suite v2.1.3 – Local File Inclusion

SoftExpert (SE) Suite is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability to gain access to sensitive files on the server. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'managerPath' parameter of the 'defaultframe_filter.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with maliciously crafted 'managerPath' parameter. This will allow the attacker to read arbitrary files on the server.

MilleGPG5 5.9.2 (Gennaio 2023) – Local Privilege Escalation / Incorrect Access Control

The application is prone to insecure file/folder permissions on its default installation path, wrongly allowing some files to be modified by unprivileged users, malicious process and/or threat actor. Attacker can exploit the weakness abusing the 'write' permission of the main application available to all users on the system or network.

Serendipity 2.4.0 – File Inclusion RCE

The already authenticated attacker can upload HTML files on the server, which is absolutely dangerous and STUPID. In this file, the attacker can be codding a malicious web-socket responder that can connect with some nasty webserver somewhere. It depends on the scenario, the attacker can steal every day very sensitive information, for a very long period of time, until the other users will know that something is not ok with this system, and they decide to stop using her, but maybe they will be too late for this decision.

PHP Restaurants 1.0 – SQLi Authentication Bypass & Cross Site Scripting (XSS)

A vulnerability exists in the PHP Restaurants 1.0 software, which allows an attacker to bypass authentication and perform Cross Site Scripting (XSS) attacks. The vulnerability is due to the lack of input validation in the login function of the functions.php file. An attacker can exploit this vulnerability by sending a specially crafted request to the login.php page with an email and password parameter containing an SQL injection payload. This will allow the attacker to bypass authentication and gain access to the admin page. Additionally, an attacker can exploit the Cross Site Scripting (XSS) vulnerability by sending a specially crafted request to the index.php page with a search parameter containing an XSS payload. This will allow the attacker to execute malicious JavaScript code in the context of the web browser.

Recent Exploits: