header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

pfsenseCE v2.6.0 – Anti-brute force protection bypass

This exploit allows an attacker to bypass the anti-brute force protection of pfsenseCE v2.6.0 by using a specially crafted POST request. The exploit is possible due to a lack of proper input validation and authentication checks.

ESET Service 16.0.26.0 – ‘Service ekrn’ Unquoted Service Path

A vulnerability in ESET Service 16.0.26.0 allows an attacker to gain elevated privileges by exploiting an unquoted service path. The vulnerability exists in the 'ekrn' service, which is installed with ESET Security. By exploiting the vulnerability, an attacker can gain SYSTEM privileges on the affected system.

Pentaho BA Server EE 9.3.0.0-428 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable system by exploiting two CVEs, CVE-2022-43769 and CVE-2022-43939. The exploit works by sending a specially crafted request to the server which contains a command to be executed. The command is sent via a URL parameter and is executed using the Java Runtime.getRuntime().exec() method.

ZCBS/ZBBS/ZPBS v4.14k – Reflected Cross-Site Scripting (XSS)

The vulnerability exists due to insufficient sanitization of the 'ident' parameter in the 'objecten.pl' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary HTML and script code in the browser of the victim in context of the vulnerable website.

X2CRM v6.6/6.9 – Reflected Cross-Site Scripting (XSS) (Authenticated)

X2CRM v6.6/6.9 is vulnerable to Reflected Cross-Site Scripting (XSS) when an authenticated user injects malicious payload to the vulnerable parameter in GET request. The payload used in this exploit is '"><body onload="alert(4)">' which will execute a JavaScript alert box with the value 4.

X2CRM v6.6/6.9 – Stored Cross-Site Scripting (XSS) (Authenticated)

X2CRM v6.6/6.9 is vulnerable to Stored Cross-Site Scripting (XSS) when an authenticated user injects malicious payload to the vulnerable parameter in POST request. The vulnerable parameter is Actions[subject]. An attacker can inject malicious payload to the parameter and execute arbitrary JavaScript code in the victim's browser.

Recent Exploits: