header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpAbook 0.9i – SQL Injection

This exploit allows an attacker to gain access to the admin hash of the phpAbook 0.9i application. The exploit works by sending a malicious request to the index.php page of the application, which contains an SQL injection payload. The payload is designed to extract the admin hash from the ab_auth_user table, by looping through each character of the hash and comparing it to a known character set. If the character matches, the payload will cause the application to sleep for 3 seconds, allowing the attacker to identify the character of the hash.

Netgear WNAP320 2.0.3 – ‘macAddress’ Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary commands on the Netgear WNAP320 Access Point Firmware v2.0.3 by sending a maliciously crafted POST request to the /boardDataWW.php macAddress parameter.

Atlassian Jira Server/Data Center 8.16.0 – Reflected Cross-Site Scripting (XSS)

The number range searcher component in Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before version 8.13.6, and from version 8.14.0 before version 8.16.1 allows remote attackers inject arbitrary HTML or JavaScript via across site scripting (XSS) vulnerability.

WordPress Plugin YOP Polls 6.2.7 – Stored Cross Site Scripting (XSS)

When a poll is created that allows other answers and then the setting is enabled for displaying the other responses after submission, the other answer is not sanitized when displayed back to the user, showing an XSS vulnerability. It is, however, correctly sanitized when displaying the other choices on the initial vote page.

Simple Client Management System 1.0 – ‘uemail’ SQL Injection (Unauthenticated)

A SQL injection vulnerability exists in Simple Client Management System 1.0, which allows an unauthenticated attacker to execute arbitrary SQL commands via the 'uemail' parameter in a POST request. An attacker can use the payload 'admin' or 1=1# to exploit this vulnerability.

Seeddms 5.1.10 – Remote Command Execution (RCE) (Authenticated)

SeedDMS is vulnerable to a Remote Command Execution (RCE) vulnerability. An authenticated user can upload a malicious file and execute arbitrary commands on the server. This vulnerability affects Seeddms 5.1.10 and prior versions. The exploit requires the attacker to have valid credentials to the application.

TP-Link TL-WR841N – Command Injection

A command injection vulnerability exists in TP-Link TL-WR841N 0.9.1 4.0. An attacker can send a malicious payload to the router via a POST request to the /cgi?2 endpoint, which will be executed on the router. This can be exploited to execute arbitrary commands on the router.

Adobe ColdFusion 8 – Remote Command Execution (RCE)

A vulnerability in Adobe ColdFusion 8 allows an attacker to execute arbitrary commands on the target system. This is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. Successful exploitation of this vulnerability can result in arbitrary code execution on the target system.

VMware vCenter Server RCE 6.5 / 6.7 / 7.0 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable system. The vulnerability exists in the vSphere Client (HTML5) which is a web-based application that allows administrators to manage vCenter Server and ESXi hosts. The vulnerability is due to improper validation of user-supplied input in the vSphere Client (HTML5). An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vSphere Client (HTML5) to execute arbitrary code on the vulnerable system.

Recent Exploits: