header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HRSALE The Ultimate HRM 1.0.2 – CSV Injection

A user is able to inject a command that will be included in the exported CSV file. To exploit this vulnerability, a user must login with employee user credentials, browse to My Profile and add =cmd|'/C calc'!A1 into the First Name field. Then, the user must log in with admin's credentials, browse to Core HR > Employees Last Login, click on the CSV button to download and open the exported CSV file. The calculator will be opened.

Blog Master Pro v1.0 – CSV Injection

A user is able to inject a command that will be included in the exported CSV file. To exploit this vulnerability, a user must login with regular user's credentials, add =cmd|'/C calc'!A1 as a comment on any article, log in with admin's credentials, browse to Dashboard > Comments, click on the CSV button to download and open the exported CSV file, and the command will be executed.

Shopy Point of Sale v1.0 – CSV Injection

A user is able to inject a command that will be included in the exported CSV file. To exploit this vulnerability, a user must first login with Sales user's credentials, then browse to Trader > Customer > New Customer and add =cmd|'/C calc'!A1 into the Customer Name field. The user must then log in with admin's credentials, browse to Sales > Create Invoice to create an invoice for that user, and finally browse to All Invoice > Export to download and open the exported CSV file.

VMware ESXi Unauthenticated Remote Code Execution Vulnerability

A vulnerability in VMware ESXi could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to improper validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending a crafted request to the affected software. A successful exploit could allow the attacker to execute arbitrary code on the targeted system.

Multiple Stored XSS Vulnerabilities

Multiple stored XSS vulnerabilities were discovered in WSO2 Carbon and WSO2 Dashboard Server. The vulnerabilities allow an attacker to inject malicious JavaScript code into the application, which is then executed in the browser of the victim when the application is accessed. The malicious code can be used to steal session cookies, hijack user sessions, redirect users to malicious websites, or perform other malicious actions.

Microsoft Internet Explorer (Win 10) Denial of Service

Microsoft Internet Explorer (Win 10) is vulnerable to a Denial of Service (DoS) attack due to a null pointer de-reference (read) when MSIE encounters an specially crafted HTML HREF tag containing an empty reference for certain Windows file types. Upon IE crash it will at times daringly attempt to restart itself, if that occurs and user is prompted by IE to restore their browser session, then selecting this option so far in my tests has shown to repeat the crash all over again. This can be leveraged by visiting a hostile webpage or link to crash an end users MSIE browser. Referencing some of the following extensions .exe:, .com:, .pif:, .bat: and .scr: should produce the same.

Recent Exploits: