header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Simple Task List 1.0 – ‘status’ SQL Injection

Simple Task List version 1.0 is vulnerable to SQL Injection in the 'status' parameter of the addTask.php file. An attacker can exploit this vulnerability to execute malicious SQL queries, potentially leading to unauthorized access and extraction of sensitive data from the database.

Stored Cross-Site Scripting (XSS) in LimeSurvey Community Edition Version 5.3.32+220817

A critical security vulnerability in LimeSurvey Community Edition Version 5.3.32+220817 allows attackers to compromise the super-admin account through the 'Administrator email address:' field in 'General Setting.' This could result in theft of cookies and session tokens.

WordPress Plugin Playlist for Youtube – Stored Cross-Site Scripting (XSS)

The Wordpress Plugin Playlist for Youtube version 1.32 is vulnerable to stored cross-site scripting (XSS) attack. By injecting a malicious XSS payload into the 'Name' or 'Playlist ID' properties when adding a new playlist, an attacker can execute arbitrary scripts in the context of a user's browser.

Karaf v4.4.3 Console Remote Code Execution

The exploit allows an attacker to execute remote code on the Karaf Console. By sending a crafted request, an attacker can open a reverse shell connection, giving them unauthorized access to the system. This vulnerability has been assigned the CVE identifier CVE-2023-XXXXX.

Dell Security Management Server Privilege Escalation

Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 are vulnerable to privilege escalation. This is due to improper ACLs of the non-default installation directory. An attacker with local access could exploit this by replacing binaries in the installation directory, allowing them to execute arbitrary commands and potentially gain elevated privileges on the system.

OpenClinic GA 5.247.01 – Path Traversal Vulnerability (Authenticated)

An authenticated path traversal vulnerability was found in OpenClinic GA version 5.247.01. By manipulating the 'Page' parameter in a GET request to 'main.do', an attacker can navigate to arbitrary directories and retrieve or execute files. This can lead to unauthorized access to sensitive information or facilitate more severe attacks.

Recent Exploits: