header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Reflected Cross-Site Scripting on ZTE MF65

The Mobile Hotspot having the said firmware version doesn’t sanitize the input argument 'cmd' used in the page '/goform_get_cmd_process'. A malicious input held by the parameter in the URL could result to client-side script execution or HTML code injection.

Google Chrome 71.0.3578.98 V8 JavaScript Engine – Out-of-memory. Denial of Service (PoC)

A fatal javascript Out-of-Memory (OOM) vulnerability exists in the CALL_AND_RETRY_LAST function of the V8 JavaScript Engine in Google Chrome 71.0.3578.98. An attacker can exploit this vulnerability to cause a denial of service condition. This vulnerability is tracked in Chromium as issue 917631.

Dolibarr ERP-CRM 8.0.4 – ‘rowid’ SQL Injection

An attacker can access all data following an un/authorized user login using the parameter 'rowid' in the POST request URL http://localhost/doli/htdocs/admin/dict.php?id=16 with the payload 'AND EXTRACTVALUE(6385,CONCAT(0x5c,0x716b717871,(SELECT (ELT(6385=6385,1))),0x7176787171)) AND '%'='&search_code=94102&token=$2y$10$KhKjYSBlkY24Xl8v.d0ZruN98LAFOAZ5a5dzi4Lxe3g21Gx46deHK'

Huawei E5330 Cross-Site Request Forgery (Send SMS)

This exploit allows an attacker to send a malicious SMS to a receiving phone number from a Huawei E5330 router. The administrator who opens the URL should be authenticated. The exploit uses XMLHttpRequest to send a POST request to the router's API with the receiving phone number and the malicious SMS text. The exploit also sets the date of the SMS to the current date and time.

Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 JS/HTML Code Injection

The application suffers from a stored XSS vulnerability. The issue is triggered via unrestricted file upload while restoring a config file allowing the attacker to upload an html or javascript file that will be stored in /settings/poc.html. This can be exploited to execute arbitrary HTML or JS code in a user's browser session in context of an affected site.

Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 Cross-Site Request Forgery

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

BlueAuditor 1.7.2.0 – ‘Key’ Denial of Service (PoC)

A buffer overflow vulnerability exists in BlueAuditor 1.7.2.0 when a maliciously crafted 'Key' is entered into the registration code field. An attacker can exploit this vulnerability to cause a denial of service condition. This can be exploited by running a python code to generate a maliciously crafted 'Key' and then entering it into the registration code field.

Recent Exploits: