header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Customer Support System 1.0 – ‘description’ Stored XSS in The Admin Panel

A stored XSS vulnerability exists in the Customer Support System 1.0 application. An attacker can exploit this vulnerability by navigating to http://TARGET/customer_support/index.php?page=department_list, clicking on new Department, and adding the XSS payload into the 'description' parameter value. Browsing to the post will trigger the XSS payload.

Anuko Time Tracker 1.19.23.5325 – CSV/Formula Injection

CSV Injection (aka Excel Macro Injection or Formula Injection) exists in Reports feature in Anuko Time Tracker v1.19.23.5311 via User, Project and Note data field that is mistreated while exporting to a CSV file. To exploit this vulnerability: 1. Login to the application, goto 'User' module and edit the user 2. Inject the payload *=rundll32|'URL.dll,OpenURL calc.exe'!A* in the 'Name' field 3. Goto 'Project' module, add a new project with the same malicious payload in the 'Name' field 4. Goto 'Time' module, select our created User, Project and again enter the same payload in 'Note' field 5. Enter the rest of the details and click 'Submit' 6. Now goto 'Reports' click Generateand download the CSV file 7. Open the CSV file, allow all popups and our payload is executed (calculator is opened).

ShoreTel Conferencing 19.46.1802.0 – Reflected Cross-Site Scripting

The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting attack (XSS) via the PATH_INFO to index.php, due to insufficient validation for the time_zone object in the HOME_MEETING& page. Vulnerable payload /index.php/%22%20onmouseover=alert(document.domain)%20?page=HOME Vulnerability is in the HOME_MEETINGS& page, where a time_zone dropdown object is located. Upon executing the payload, the exploit executes when the mouse is rolled over the dropdown menu object.

Car Rental Management System 1.0 – SQL injection + Arbitrary File Upload

This script will perform an automatic login using sql injection "'OR 1 = 1 limit 1 #" and will create a new car in the archive, assigning a PHP file instead of the image of the car itself. This car, having "AAAAAAAAAAA" as a brand, will be the first among those displayed and we will use the file just uploaded with a phpshell on the victim system. On the Attacker machine, the user must listen with NC on a port.

Deep Instinct Windows Agent 1.2.24.0 – ‘DeepNetworkService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Canon Inkjet Extended Survey Program 5.1.0.8 – ‘IJPLMSVC.EXE’ – Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: