header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Docker Daemon – Unprotected TCP Socket

Utilizing Docker via unprotected tcp socket (2375/tcp, maybe 2376/tcp with tls but without tls-auth), an attacker can create a docker container with the '/' path mounted with read/write permissions on the host server that is running the docker container and use chroot to escape the container-jail.

Virtual Postage (VPA) – Remote Code Execution via MITM

The Android application is vulnerable to Remote Code Execution via Man-In-The-Middle (MITM) attacks. This is caused by the application sending the user's credentials (username and password) over an unencrypted HTTP GET request, which can be intercepted by an attacker.

SKILLS.com.au Industry App – Remote Code Execution via MITM

The Android application is vulnerable to Remote Code Execution via Man-In-The-Middle (MITM) attacks. This is caused by the application sending the credentials (username and password) over an HTTP GET request, which is vulnerable to MITM attacks.

Tilde CMS 1.01 Multiple Vulnerabilities

Due to missing escaping of the backtick character, the following query in the source code is vulnerable. The vulnerability can be trigged via a POST request. The vulnerability exists on this method: GET /actionphp/download.File.php?&file=../../../../../../etc/passwd. It is possible to bypass the implemented restrictions by uploading a malicious file with a double extension, such as 'file.php.txt'.

Joomla JoomRecipe 1.0.4 Component – Blind SQL Injection Vulnerability

Blind SQL Injection on Search page, with 'search_author' parameter (POST). sqlmap.py -u 'http://localhost/[PATH]/search/results.html' -p search_author --data 'searchPerformed=1&task=search&searchword=asd&searchCategories%5B%5D=*&search_cuisine=&searchSeasons=&search_author=1&search_max_prep_hours=2&search_max_prep_minutes=0&search_max_cook_hours=2&search_max_cook_minutes=0&search_min_rate=0&search_max_cost=999&currentIngredient=' --random-agent --dbs

Citix SD-WAN logout cookie preauth Remote Command Injection Vulnerablity

This module exploits a remote command execution vulnerability in the Citrix SD-WAN Appliace Version <= v9.1.2.26.561201. The vulnerability exist in a section of the machine's session checking functionality. If the CGISESSID cookie holds shell-command data - it is used in a call to system where input is processed unsanitized.

Recent Exploits: