header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Select All Categories and Taxonomies 1.3.1 – Reflected Cross-Site Scripting (XSS)

WordPress Select All Categories and Taxonomies plugin before 1.3.2 contains a cross-site scripting vulnerability. The settings page of the plugin does not properly sanitize the tab parameter before outputting it back. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Storage Unit Rental Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable Storage Unit Rental Management System 1.0. The attacker can send a malicious request with a crafted payload to the vulnerable application, which will then be executed on the server. The payload is sent as a multipart/form-data request with a filename containing the malicious code.

WordPress Plugin Ultimate Maps 1.2.4 – Reflected Cross-Site Scripting (XSS)

WordPress Supsystic Ultimate Maps plugin before 1.2.5 contains an unauthenticated reflected cross-site scripting vulnerability due to improper sanitization of the tab parameter on the options page before outputting it in an attribute.

FatPipe Networks MPVPN 10.2.2 – Remote Privilege Escalation

A vulnerability has been discovered in FatPipe Networks WARP/IPVPN/MPVPN 10.2.2, which can be exploited by malicious people to gain escalated privileges. The vulnerability is caused due to an unspecified error and can be exploited to gain escalated privileges by sending a specially crafted request to the vulnerable service. Successful exploitation requires that the attacker has access to the local network.

FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Unauthenticated Config Download

A vulnerability in FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 allows an unauthenticated attacker to download the configuration file of the device. This can be done by sending a specially crafted HTTP request to the device. The configuration file contains sensitive information such as usernames, passwords, and IP addresses.

Recent Exploits: