header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Enigma NMS OS Command Injection

NETSAS Pty Ltd Enigma NMS is vulnerable to OS Command Injection. An attacker can exploit this vulnerability to execute arbitrary commands on the vulnerable system. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'ip_address' parameter of the 'discover_and_manage.cgi' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable system.

PUBLISURE : From 0 to local Administrator (3 vulns) exploit-chain

A combination of three different vulnerabilities permits an uauthenticated attacker to gain local administrator privileges on the Publisure Hybrid Mail server.

FusionPBX v4.4.8 Remote Code Execution

FusionPBX is vulnerable to a Remote Code Execution vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable service_cmd_start parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Privileged File Access Enumeration

Attackers possessing user-only rights can gather intelligence or profile other user account activities by brute forcing a correct file name. This is possible because Windows returns inconsistent error messages when accessing unauthorized files that contain a valid extension or have a "." (dot) as part of the file or folder name.

Exploit Title: Inventory Webapp SQL injection

The Inventory Webapp is vulnerable to SQL injection. The vulnerable page is '/php/add-item.php' and the vulnerable source code is on lines 39, 40, 41, 42 and 49. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable page. The proof of concept is http://site.com/php/add-item.php?itemquery=[SQL]

WordPress Download Manager Cross-site Scripting

In the pro features of the WordPress download manager plugin, there is a Category Short-code feature witch can use to sort categories with order by a function which will be used as ?orderby=title,publish_date. By adding parameter '>' and add any XSS payload, the xss payload will execute.

Recent Exploits: