header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dell OpenManage Server Administrator 9.4.0.0 – Arbitrary File Read

Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station.

Atlassian Jira Service Desk 4.9.1 – Unrestricted File Upload to XSS

The /servicedesk/customer/portals resource in Jira Service Desk Server and Data Center before version 4.10.0 allows remote attackers with project administrator privileges to inject arbitrary HTML or JavaScript names via an Cross Site Scripting (XSS) vulnerability by uploading a html file.

Mini Mouse 9.2.0 – Path Traversal

Mini Mouse 9.2.0 is vulnerable to Path Traversal. An attacker can send a specially crafted HTTP request to the vulnerable server to traverse the file system and read arbitrary files. This can be done by sending a GET request with a path traversal payload in the 'file' parameter. An attacker can also send a POST request with a path traversal payload in the 'path' parameter to list the files in the directory.

Mini Mouse 9.2.0 – Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a vulnerable Mini Mouse 9.2.0 system. The attacker can send a malicious payload to the target system via a POST request to the vulnerable URL. The payload is then downloaded and executed on the target system.

Basic Shopping Cart 1.0 – Authentication Bypass

An authentication bypass vulnerability exists in Basic Shopping Cart 1.0, which allows an attacker to bypass authentication by entering ' or '1'='1'# in the username field. This can be exploited by sending a specially crafted POST request to the adminlogin.php page.

Simple Food Website 1.0 – Authentication Bypass

An authentication bypass vulnerability exists in Simple Food Website 1.0, which allows an attacker to gain access to the admin panel without valid credentials. This is due to the application not properly validating user input, allowing an attacker to inject malicious SQL code into the username field. By entering ' or '1'='1'# in the username field, an attacker can bypass authentication and gain access to the admin panel.

Rockstar Service – Insecure File Permissions

RockstarService.exe suffers from an elevation of privileges vulnerability which can be used by an 'Authenticated User' to modify the existing executable file of the service with a binary of his choice. The vulnerability exist due to weak set of permissions being granted to the 'Authenticated Users Group' which grants the (M) Flag aka 'Modify Privilege'.

F5 BIG-IP 16.0.x – iControl REST Remote Code Execution (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on vulnerable F5 BIG-IP devices. Affected versions are 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2. The exploit uses the requests library to send a POST request to the /mgmt/shared/authn/login endpoint with a specially crafted payload. If successful, the response will contain a token which can be used to execute arbitrary code.

phpPgAdmin 7.13.0 – COPY FROM PROGRAM Command Execution (Authenticated)

phpPgAdmin through 7.13.0 allows remote authenticated users to execute arbitrary code. An attacker can create a table named cmd_exec with one column, add type=text and cmd_out, and try to execute the query via a SQL tab. It will fail because of restrictions on statements. However, the attacker can bypass this step by uploading a .txt file (containing a SQL statement such as "COPY cmd_exec FROM PROGRAM" followed by OS commands) in the Browse bar. This achieves remote command execution via a "SELECT * FROM cmd_exec" statement.

Recent Exploits: