header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SysGauge 7.9.18 – ‘ SysGauge Server’ Unquoted Service Path

SysGauge 7.9.18 is vulnerable to Unquoted Service Path vulnerability. This vulnerability can be exploited by an attacker to gain elevated privileges on the system. The vulnerability exists due to the SysGauge Server service not properly quoting its path. An attacker can exploit this vulnerability by placing malicious files in the same directory as the service executable and then start the service.

Client Management System 1.1 – ‘Search’ SQL Injection

Client Management System 1.1 is vulnerable to SQL Injection in the admin panel 'search invoices' field because of insufficient user supplied data sanitization. To exploit, an attacker can enter the payload ' OR 'x'='x' in the search field and all results are showed instead of none.

Client Management System 1.1 – ‘username’ Stored Cross-Site Scripting (XSS)

Client Management System 1.1 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitization. To exploit this vulnerability, an attacker can enter a malicious payload in the user name field and click on Update. The payload will be stored in the database.

Tftpd64 4.64 – ‘Tftpd32_svc’ Unquoted Service Path

Tftpd64 4.64 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path. The vulnerability is caused by the service path not being properly quoted, allowing an attacker to inject malicious code into the service path.

OpenEMR 5.0.1.3 – ‘manage_site_files’ Remote Code Execution (Authenticated)

Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.

TextPattern CMS 4.8.7 – Remote Command Execution (Authenticated)

First of all, an attacker should use the file upload section to upload a malicious shell containing the code <?PHP system($_GET['cmd']);?>. Then, the attacker should go to the content section, click Files and upload the malicious php file. Finally, the attacker should go to the URL of the malicious file with the command as a parameter (e.g. yourserver/textpattern/files/yourphp.php?cmd=yourcode). After the request is sent, the response will contain the output of the command.

Recent Exploits: