header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Phoenix Contact WebVisit 2985725 – Authentication Bypass

Script to read and write PLC tags via a Webvisit HMI page (even in case of a password protection). Steps: Get Project Name: http://<ip>/, Get list of tags: http://<ip>/<projectname>.tcr, Get current values of tags: http://<ip>/cgi-bin/ILRReadValues.exe, Set new tag values: http://<ip>/cgi-bin/writeVal.exe?<tag>+<value> (urlencode!)

LUYA CMS 1.0.12 – Cross-Site Scripting

LUYA CMS version 1.0.12 is vulnerable to stored cross-site scripting. An attacker can send a malicious POST request to the '/admin/api-cms-nav/create-page' endpoint with a crafted payload in the 'title', 'description', and 'keywords' parameters to execute arbitrary JavaScript code in the victim's browser.

HaPe PKH 1.1 – ‘id’ SQL Injection

HaPe PKH 1.1 is vulnerable to SQL injection in the 'id' parameter of the 'lap-anggota-kelompok-pdf.php', 'lap-peserta-perdesa-pdf.php', 'media.php?module=desa&act=hapus&id' and 'media.php?module=pengurus&act=print&id' and 'media.php?module=pengurus&act=editpengurus&id' scripts. An attacker can inject arbitrary SQL commands to gain access to the database and execute malicious code.

Microsoft SQL Server Management Studio 17.9 – ‘.xmla’ XML External Entity Injection

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft SQL Server Management Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XMLA files. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process.

Phoenix Contact WebVisit 6.40.00 – Password Disclosure

This script will perform retrieval of clear text credentials for a Phoenix Contact PLC with a WebVisit GUI, password protected, application on it. Tested on the Phoenix Contact ILC-390 PLC, but others are surely equally vulnerable with WebVisit 6.40.00, the passwords are SHA256 hashes, which also will be retrieved.

Microsoft SQL Server Management Studio 17.9 – ‘.xel’ XML External Entity Injection

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft SQL Server Management Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XEL files. Due to the improper restriction of XML External Entity (XXE) references, a specially crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process.

WAGO 750-881 01.09.18 – Cross-Site Scripting

WAGO 750-881 Ethernet Controller devices, versions 01.09.18(13) and before, have XSS in the SNMP configuration via the webserv/cplcfg/snmp.ssi SNMP_DESC or SNMP_LOC_SNMP_CONT field. The exploit string is "<svg/onload=alert(1)>" and the http-post-data is SNMP_DESC=%22%3E%3Csvg%2Fonload%3Dalert%281%29%3E&SNMP_LOC%22%3E%3Csvg%2Fonload%3Dalert%282%29%3E&SNMP_CONT=%22%3E%3Csvg%2Fonload%3Dalert%283%29%3E&SNMP_V1V2_ENABLE=SNMP_V1V2_ENABLE&SNMP1_LCOM_NAME=public&SNMP_TR_V1V2_1_IP=0.0.0.0&SNMP1_COM_NAME=public&SNMP_V1V2_TR1_VERSION=SNMP_V1V2_TR1_VERSION1&SNMP_TR_V1V2_2_IP=0.0.0.0&SNMP2_COM_NAME=public&SNMP_V1V2_TR2_VERSION=SNMP_V1V2_TR2_VERSION1&SUBMIT=SUBMIT

Recent Exploits: