header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Excel 365 MSO (Version 2302 Build 16.0.16130.20186) 64-bit – Remote Code Execution (RCE)

The malicious user can exploit the victim's PC remotely. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.

Adobe Connect 11.4.5 – Local File Disclosure

Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.

Altenergy Power Control Software C1.2.5 – OS command injection

Altenergy Power Control Software C1.2.5 is vulnerable to OS command injection. An attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. This can allow the attacker to execute arbitrary commands on the target system.

Wondershare Dr Fone 12.9.6 – Privilege Escalation

Wondershare Dr Fone version 12.9.6 running services named 'WsDrvInst' on Windows have weak service permissions and are susceptible to local privilege escalation vulnerability. Weak service permissions run with system user permission, allowing a standard user/domain user to elevate to administrator privilege upon successfully modifying the service or replacing the affected executable. DriverInstall.exe gave modification permission to any authenticated users in the windows operating system, allowing standard users to modify the service and leading to Privilege Escalation.

Snitz Forum v1.0 – Blind SQL Injection

A vulnerability exists in Snitz Forum v1.0 which allows an attacker to perform a Blind SQL Injection attack. This can be exploited by sending a specially crafted HTTP request to the vulnerable application. This can result in the attacker gaining access to sensitive information from the database.

Franklin Fueling Systems TS-550 – Exploit and Default Password

Attacker can use dorks to find the panel and send a request to the panel. If the response contains the passwords, the attacker can crack the hashes using John the Ripper. Most of the panels have the default password as 'admin'.

Schneider Electric v1.0 – Directory traversal & Broken Authentication

Attacker can using these dorks and access to the panel without password: inurl:/cgi-bin/scada-vis/, inurl:/scada-vis/schedulers, inurl:/cgi-bin/scada-vis/index.cgi, inurl:/scada-vis, inurl:/cgi-bin/scada-vis/touch.html. Attacker can these this dork for bruteforce the panel: inurl:/scada-vis/pin?return=index.

ChurchCRM 4.5.1 – Authenticated SQL Injection

The endpoint /EventAttendance.php is vulnerable to Authenticated SQL Injection (Union-based and Blind-based) via the Event GET parameter. This endpoint can be triggered through the following menu: Events - Event Attendance Reports - Church Service/Sunday School. The Event Parameter is taken directly from the query string and passed into the SQL query without any sanitization or input escaping. This allows the attacker to inject malicious Event payloads to execute the malicious SQL query.

Recent Exploits: