header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Novell ServiceDesk Authenticated File Upload

This module exploits an authenticated arbitrary file upload via directory traversal to execute code on the target. It has been tested on versions 6.5 and 7.1.0, in Windows and Linux installations of Novell ServiceDesk, as well as the Virtual Appliance provided by Novell.

Webutler CMS Cross-Site Request Forgery

The Webutler is a simple online page editor for static HTML files. Webmasters can provide a simple login option for image and text editing to their customers. The Webutler is a tool for websites or projects to be implemented with a small effort. The project has grown over the years and now you can do a lot of things with it. The all of administrative function allow any users to perform HTTP request without verify the request. This exploit can be performed while the logged on user (administrator) visit malicious web page that embedded HTML form.

TH692- Outdoor P2P HD Waterproof IP Camera hardcoded credentials

The TH692- Outdoor P2P HD Waterproof IP Camera from TENVIS Technology Co., Ltd. contains hardcoded credentials in the firmware. The firmware version TH692C-V. 16.1.16.1.1.4 contains two sets of credentials, Mroot and Wproot, both with the password 'cat1029'. These credentials can be used to gain access to the device.

CSRF and stored XSS vulnerability in Kento post view counter plugin version 2.8

The vulnerable Fields for XSS are kento_pvc_numbers_lang, kento_pvc_today_text, and kento_pvc_total_text. The combination of CSRF and XSS in this plugin can lead to huge damage of the website, as the two fields kento_pvc_today_text and kento_pvc_total_text are reflected on all authenticated users as well as non-authenticated user, all the post have a footer which shows this two parameter reflected in them, so if an attacker successfully attacks a website almost all the pages on that website will execute the malicious javascript payload on all the clients browsers visiting that website. The Code for CSRF.html is provided in the text.

CSRF and stored XSS vulnerability in WordPress plugin LeenkMe version 2.5.0

The plugin LeenkMe version 2.5.0 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). The XSS vulnerable fields are facebook_message, facebook_linkname, facebook_caption, facebook_description, default_image, and _wp_http_referer. The vulnerable page is wp-content/plugins/leenkme/facebook.php and the vulnerable code producing XSS is if ( !empty( $_REQUEST['facebook_message'] ) ) $user_settings['facebook_message'] = $_REQUEST['facebook_message']; else $user_settings['facebook_message'] = ''; if ( !empty( $_REQUEST['facebook_linkname'] ) ) $user_settings['facebook_linkname'] = $_REQUEST['facebook_linkname']; else $user_settings['facebook_linkname'] = ''; if ( !empty( $_REQUEST['facebook_caption'] ) ) $user_settings['facebook_caption'] = $_REQUEST['facebook_caption']; else $user_settings['facebook_caption'] = ''; if ( !empty( $_REQUEST['facebook_description'] ) ) $user_settings['facebook_description'] = $_REQUEST['facebook_description']; else $user_settings['facebook_description'] = '';

AirMax Systems File Overwrite Vulnerability

It's possible to overwrite any file (and create new ones) on AirMax systems, because the 'php2' (maybe because of a patch) don't verify the 'filename' value of a POST request. It's possible to a unauthenticated user to exploit this vulnerability. An attacker can take control over any AirMax Product with a simple forged http POST request.

Recent Exploits: