header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

D-Link Dir-600M N150 – Cross-Site Scripting

A Cross-Site Scripting (XSS) vulnerability was discovered in the D-Link Dir-600M N150 router. An attacker can inject malicious JavaScript code into the 'Hostname' and 'Username' fields of the Dynamic DNS page, which will be executed when the page is loaded by an authenticated user.

Apache Roller 5.0.3 – XML External Entity Injection (File Disclosure)

This exploit lets you read almost any file on a vulnerable server via XXE vulnerability. There are two types of payload this exploit is able to use, 'SIMPLE' & 'ADVANCED'. 'SIMPLE' payload will work in most cases and will be used by default, if server errors out, use 'ADVANCED' payload. 'ADVANCED' payload will start local web server and serve malicious XML which will be parsed by a target server. To successfully perform attack with 'ADVANCED' payload, make sure that port you listen on (--lport flag) is accessible out of the network.

Jorani Leave Management 0.6.5 – ‘startdate’ SQL Injection

Jorani Leave Management System 0.6.5 and possibly before are affected by SQL Injection in startdate and enddate parameters through POST request in '/leaves/validate' resource. This allows a user of the application without permissions to read and modify sensitive information from the database used by the application.

NovaRad NovaPACS Diagnostics Viewer 8.5 – XML External Entity Injection (File Disclosure)

NovaPACS suffers from an unauthenticated XML External Entity (XXE) injection vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data from the affected node via out-of-band (OOB) channel attack. The vulnerability is triggered when importing XML format preferences within the settings submenu.

Tenda D152 ADSL Router – Cross-Site Scripting

Tenda D152 ADSL Router is vulnerable to Cross-Site Scripting (XSS) vulnerability. An attacker can inject malicious JavaScript code into the SSID field of the router's web interface. When a user visits the router's web interface, the malicious code will be executed in the user's browser, allowing the attacker to gain access to the user's session.

Microsoft people 10.1807.2131.0 – Denial of Service (PoC)

Microsoft people desktop application is a contact management app and address book included in Microsoft's Windows 8 and 10. It allows a user to organize and link contacts from different email accounts with a unique graphical interface. An attacker can create a malicious file containing a large number of characters and paste it into the name field of the application, causing the application to crash.

Recent Exploits: