header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

UJCMS 9.6.3 User Enumeration via IDOR

An Insecure Direct Object Reference (IDOR) vulnerability was found in UJCMS version 9.6.3, enabling unauthorized username enumeration through manipulation of the user id parameter in the /users/id endpoint. Despite user IDs being mostly large numbers, attackers can still discover existing account usernames without authentication, except for admin and anonymous accounts.

Kubio AI Page Builder <= 2.5.1 - Local File Inclusion (LFI)

The Kubio AI Page Builder plugin for WordPress version 2.5.1 and below is vulnerable to Local File Inclusion (LFI) in the `kubio_hybrid_theme_load_template` function. This allows unauthorized attackers to read arbitrary files through path traversal, potentially leading to Remote Code Execution (RCE) when combined with file upload capabilities.

TranzAxis 3.2.41.10.26 – Stored Cross-Site Scripting (XSS) (Authenticated)

The TranzAxis version 3.2.41.10.26 web application is vulnerable to stored cross-site scripting (XSS) attacks. An authenticated user can inject malicious scripts by supplying a crafted payload in the 'Enter Explorer Item Title' field, leading to the execution of arbitrary code in the context of the user's session.

ManageEngine ADManager Plus Build < 7210 Elevation of Privilege Vulnerability

The vulnerability exists in ManageEngine ADManager Plus Build < 7210. A user with the 'Modify Computers' privilege in ADManager can alter attributes of computer objects in Active Directory, allowing them to set Constrained Kerberos Delegation and access services like CIFS, LDAP, and HOST services. This manipulation grants the user privileges they are not supposed to have, bypassing the normal restrictions.

Unzip-Stream 0.3.1 Arbitrary File Write

The unzip-stream version 0.3.1 allows an attacker to write arbitrary files by manipulating the 'arcname' parameter, circumventing restrictions in Python's 'zipfile' module. By crafting a malicious ZIP file, an attacker can overwrite files on the target system. This vulnerability has been assigned CVE-2024-42471.

Recent Exploits: