header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MISP 2.4.171 Stored Cross-Site Scripting Vulnerability

The MISP version 2.4.171 is prone to a stored cross-site scripting vulnerability. An authenticated attacker can inject malicious scripts into the 'Name' parameter when adding a cluster under the 'Galaxies' section, leading to the execution of arbitrary scripts in the context of the victim's browser. This vulnerability has been assigned CVE-2023-37307.

TitanNit Web Control 2.01 / Atemio 7600 Root Remote Code Execution

The vulnerability in Atemio AM 520 HD Full HD satellite receiver with firmware <=2.01 allows an unauthorized attacker to execute system commands with elevated privileges by utilizing the 'getcommand' query in the application, leading to root access.

Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass Vulnerability

The vulnerability in Microsoft Windows PowerShell allows for code execution by bypassing single quote restrictions. By using a combination of semicolon and ampersand characters, a specially crafted filename can trigger arbitrary code execution and evade PS event logging. This can lead to unauthorized file execution and potential security breaches.

GYM Management System – Cross Site Scripting (Stored)

The GYM Management System version 1.0 is vulnerable to stored cross-site scripting (XSS) due to insufficient validation of user-supplied data. An attacker can inject a malicious payload in the 'lname' field, leading to the execution of arbitrary JavaScript code in the context of the victim's browser. This can result in session hijacking, sensitive information theft, or other malicious actions. The vulnerability was detected by Alperen Yozgat.

DS Wireless Communication Remote Code Execution

The exploit allows injection of arbitrary code into a client's game through a crafted payload. The code author holds no liability for any damages caused by the usage of this exploit. By exploiting this vulnerability, an attacker can execute remote code on the target system.

Clinic’s Patient Management System 1.0 – Unauthenticated Remote Code Execution

Unauthenticated users can exploit the Clinic's Patient Management System version 1.0 by uploading a malicious PHP file in place of a profile picture via the /pms/users.php address. This allows attackers to execute arbitrary commands on the server without requiring any authentication.

Recent Exploits: