header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Auto Dealership & Vehicle Showroom WebSys 1.0 – Persistent Cross-Site Scripting / Cross-Site Request Forgery / Admin panel Authentication bypass

Auto Dealership & Vehicle Showroom WebSys 1.0 suffers from multiple vulnerabilities. POC 1 demonstrates persistent cross-site scripting by injecting a payload into the profile update feature. POC 2 shows how an attacker can perform CSRF attacks to change user authentication and modify admin page settings. POC 3 showcases an authentication bypass vulnerability in the admin panel.

ActiveKB NX 2.? ( Powered by ActiveKB Knowledgebase Software) (index.php) SQL Injection

The ActiveKB NX 2.? software, powered by ActiveKB Knowledgebase Software, is vulnerable to SQL Injection attacks. This allows an attacker to execute arbitrary SQL commands through the 'catId' parameter in the 'index.php' file. By exploiting this vulnerability, an attacker can bypass authentication, access sensitive information, modify the database, or perform other malicious activities.

MikroTik 6.41.4 Denial of service FTP daemon crash

A vulnerability in MikroTik Version 6.41.4 could allow an unauthenticated remote attacker to exhaust all available CPU and all available RAM by sending crafted FTP requests on port 21 that begins with many '' characters, preventing the affected router from accepting new FTP connections. The router will reboot after 10 minutes, logging a "router was rebooted without proper shutdown" message.

Neuron News 1.0 Local File Inclusion Vulnerability

The Neuron News 1.0 portal is vulnerable to local file inclusion. An attacker can exploit this vulnerability by supplying a malicious file path in the 'q' parameter of the index.php page. This can lead to the inclusion of arbitrary files from the target system, potentially allowing the attacker to read sensitive information or execute malicious code.

LabF nfsAxe 3.7 – Privilege Escalation

By default, LabF nfsAxe 3.7 installs to "C:UsersPublicProgram FilesLabF.comnfsAxe" and installs a service called "XwpXSetSrvnfsAxe service". By default in Windows with Public Folder sharing enabled, the permissions on any file/folder under "C:UsersPublic" is Full Control for Everyone. This means unprivileged users have the ability to add

Yahoo! Messenger 8.1.0.421 CYFT Object (ft60.dll) Arbitrary File Download

This exploit allows an attacker to download an arbitrary file on the user's pc using the 'GetFile()' method in the CYFT Object (ft60.dll) in Yahoo! Messenger 8.1.0.421. Remote execution depends on Internet Explorer settings, while local execution works very well.

Parallels Remote Application Server (RAS) 15.5 Path Traversal

The web interface of the Parallels Remote Application Server is vulnerable to Path Traversal. The vulnerability exists due to improper validation of the file path when requesting a resource under the 'RASHTML5Gateway' directory. A remote, unauthenticated attacker could exploit this weakness to read arbitrary files from the vulnerable system using path traversal sequences ('..\').

SimpCMS <= all Remote SQL Injection Vulnerability

The SimpCMS website is vulnerable to remote SQL injection. By manipulating the 'keyword' parameter in the search area, an attacker can inject malicious SQL code and retrieve sensitive information from the database. The vulnerability allows union-based SQL injection, enabling the attacker to extract data from different database tables. Examples of queries that can be executed are provided in the exploit section.

Windows: NPFS Symlink Security Feature Bypass/Elevation of Privilege/Dangerous Behavior

It’s possible to create NPFS symlinks as a low IL or normal user and the implementation doesn’t behave in a similar manner to other types of Windows symlinks leading to dangerous behavior or EoP.

Recent Exploits: