header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Employee Management System 1.0 – `txtfullname` and `txtphone` SQL Injection

SQL injection vulnerability in Employee Management System 1.0 allows an attacker to manipulate database queries through user input fields `txtfullname` and `txtphone`. Successful exploitation can lead to data exfiltration, data manipulation, unauthorized administration operations, file system access, and potentially OS command execution.

Human Resource Management System v1.0 – Multiple SQL Injection

The 'cityedit' parameter in the Human Resource Management System v1.0 is vulnerable to SQL injection attacks. An attacker can inject a payload that calls MySQL's load_file function with a UNC file path referencing a URL on an external domain. By executing this injected SQL query, the attacker can gain access to all information stored in the system.

Stored Cross-Site Scripting (XSS) in WordPress Plugin WP Video Playlist 1.1.1

The Wordpress Plugin WP Video Playlist 1.1.1 is vulnerable to stored cross-site scripting (XSS) attack. An attacker can inject malicious scripts into the 'videoFields[post_type]' input field, leading to the execution of arbitrary code in the context of the user's browser. This can result in cookie theft, session hijacking, or other malicious activities.

Siklu MultiHaul TG series – Unauthenticated Credential Disclosure

The Siklu MultiHaul TG series with a version less than 2.0.0 allows unauthenticated credential disclosure. By exploiting this vulnerability, an attacker can obtain random generated username and password, gaining unauthorized access to the device.

Unauthenticated RCE in ZoneMinder Snapshots

The exploit allows an unauthenticated attacker to execute arbitrary commands on the vulnerable ZoneMinder instances prior to versions 1.36.33 and 1.37.33. By manipulating a crafted request, the attacker can inject and execute commands on the system. This vulnerability is identified as CVE-2023-26035.

Rapid7 Nexpose Unquoted Service Path Vulnerability

The Rapid7 Nexpose Security Console version 6.6.240 on Windows 10 x64 is vulnerable to an unquoted service path issue. By inserting malicious code into the system root path, an attacker could potentially execute the code with elevated privileges during application startup or reboot.

ESET NOD32 Antivirus 17.0.16.0 – Unquoted Service Path

The ESET NOD32 Antivirus version 17.0.16.0 on Windows 10 has an unquoted service path vulnerability. An attacker could exploit this by placing a malicious executable in a directory included in the system's PATH environment variable, leading to arbitrary code execution. This vulnerability has been identified as CVE-2024-XXXXX.

Terratec dmx_6fire USB – Unquoted Service Path

Terratec dmx_6fire USB software installs a service with an unquoted service path that runs with SYSTEM privileges. This vulnerability could be exploited by a non-privileged local user to execute arbitrary code with elevated privileges on the system.

Recent Exploits: