header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin WP Sitemap Page 1.6.2 – Persistent Cross-Site Scripting

An easy way to add a sitemap on one of your pages becomes reality thanks to this WordPress plugin. Just use the shortcode [wp_sitemap_page] on any of your pages. This will automatically generate a sitemap of all your pages and posts. An attacker can inject malicious JavaScript code into the ‘Exclude pages’ field of the plugin settings page, which will be executed when a user visits the page containing the sitemap.

LabVantage 8.3 – Information Disclosure

LabVantage 8.3 is vulnerable to an information disclosure vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request to the target server. This request will return the database name and version of the LabVantage application, which can be used to further exploit the application.

WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 – Persistent Cross-Site Scripting

A vulnerability in the Wordpress Plugin WOOF Products Filter for WooCommerce 1.2.3 allows an attacker to inject malicious JavaScript code into the application. This code can be executed when a user visits the affected page. The attacker can use this vulnerability to steal user data, hijack user sessions, and perform other malicious activities.

WordPress Theme Fruitful 3.8 – Persistent Cross-Site Scripting

Fruitful is Free WordPress responsive theme with powerful theme options panel and simple clean front end design. To exploit this vulnerability, an attacker can inject malicious JavaScript code into the Name and Email fields of the comment form. When the comment is posted, the malicious code will be executed in the browser of the user who views the comment.

Ice HRM 26.2.0 – Cross-Site Request Forgery (Add User)

The Ice HRM Web Application is vulnerable to CSRF that leads to arbitrary user creation or password change. The POC for user creation includes a form with hidden inputs that when submitted, creates a user with the username 'test' and email 'test@test.com'. The POC for password change includes a form with hidden inputs that when submitted, changes the password of the user with the ID 1 to 'admin123'.

DHCP Turbo 4.61298 – ‘DHCP Turbo 4’ Unquoted Service Path

DHCP Turbo 4.61298 is vulnerable to Unquoted Service Path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path of the application. The service path of the application is not quoted which allows an attacker to inject malicious code in the service path and gain elevated privileges.

HP System Event 1.2.9.0 – ‘HPWMISVC’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: