header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RSS News AutoPilot Script – Admin Panel Authentication Bypass

An Attackers are able to completely takeover the web application using RSS News - AutoPilot Script as they can gain access to the admin panel and manage the website as an admin. Steps to Reproduce: Step 1: Add: http://victim-site.com/admin/login.php in a rule list on No-Redirect Extension. Step 2: Access: http://victim-site.com/admin/index.php Step 3: Bypassed.

Hotspot Shield Unquoted Service Path Privilege Escalation

Hotspot Shield installs as a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

Colorful Blog – Stored Cross Site Scripting

A stored XSS vulnerability exists in Colorful Blog, which allows an attacker to inject malicious JavaScript code into the 'adsoyad' parameter of the 'single.php' page. By sending a crafted POST request with the malicious payload, an attacker can execute arbitrary JavaScript code in the victim's browser.

IObit Malware Fighter Unquoted Service Path Privilege Escalation

IObit Malware Fighter installs two service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

VOX Music Player 2.8.8 ‘.pls’ Local Crash PoC

The vulnerability exists due to a boundary error when processing .pls files. A specially crafted .pls file can cause a buffer overflow, resulting in a crash of the application. This can be exploited to execute arbitrary code by enticing a user to open a malicious .pls file.

ATKGFNEXSrv ATKGFNEX- Privilege Escalation Unquoted Service Path vulnerability

The application suffers from an unquoted service path issue impacting the service 'ATKGFNEXSrv (GFNEXSrv.exe)' deployed as part of ATKGFNEX. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.

InsOnSrv Asus InstantOn- Privilege Escalation Unquoted Service Path vulnerability

The application suffers from an unquoted service path issue impacting the service 'ASUS InstantOn (InsOnSrv.exe)' deployed as part of Asus InstantOn. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.

ASLDRService ATK Hotkey- Privilege Escalation Unquoted Service Path

The application suffers from an unquoted service path issue impacting the service 'ASLDRService' deployed as part of ATK Hotkey. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges on the system.

Simple Blog PHP 2.0 – SQL Injection

This vulnerability is in admin.php file when we want to edit a post or edit a categorie and..., with id parameter can show sql injection. A simple inject: Payload: '+order+by+999--+ http://simpleblogphp.com/blog/admin.php?act=editPost&id=1'+order+by+999--+ In response can see result: Could not execute MySQL query: SELECT * FROM blog_posts WHERE id='' order by 999-- ' . Error: Unknown column '999' in 'order clause' Result of payload: Error: Unknown column '999' in 'order clause'

Recent Exploits: