header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

userSpice <= 4.3 Persistent Cross Site Scripting

A persistent Cross Site Scripting vulnerability exists in userSpice version 4.3 and below. An attacker can exploit this vulnerability by logging in with a regular user, navigating to the public profile, editing the bio and entering a XSS payload. Once anyone visits the Bio page, the payload will execute.

SOA – School Management Software with Integrated Parents/Students Portal & Mobile App – ‘access_login’ SQL Injection

The vulnerability allows an attacker to inject sql commands. The 'username' field is vulnerable in this script ('access_login' parameter). First inject payload into this parameter. then put anything in password and click login. You will have XPATH syntax error in the next page that contains user and db_name. You can find all tables and any information from database by using XPATH query. You can use extractvalue() or updatexml() for generating error.

NAT32-REMOTE-COMMAND-EXECUTION-CSRF-CVE-2018-6941

CSRF issue exists in the HTTPD component of NAT32 v2.2 Build 22284 devices that can be exploited for Remote Code Execution. Remote attackers can potentially execute arbitrary System Commands due to a Cross Site Request Forgery, if an authenticated NAT32 user clicks a malicious link or visits an attacker controlled webpage as NAT32 performs no check for blind requests.

TypeSetter CMS 5.1 Host Header Injection

The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning. A attacker can perform application modification to perform advanced attacks as as password reset/ cache poisoning etc.

Juju-run Agent Privilege Escalation

This module attempts to gain root privileges on Juju agent systems running the juju-run agent utility. Juju agent systems running agent tools prior to version 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3, provide a UNIX domain socket to manage software ('units') without setting appropriate permissions, allowing unprivileged local users to execute arbitrary commands as root. This module has been tested successfully with Juju agent tools versions 1.18.4, 1.25.5 and 1.25.9 on Ubuntu 14.04.1 LTS x86 deployed by Juju 1.18.1-trusty-amd64 and 1.25.6-trusty-amd64 on Ubuntu 14.04.1 LTS x86_64.

LibreOffice COM.MICROSOFT.WEBSERVICE Function Vulnerability

LibreOffice supports COM.MICROSOFT.WEBSERVICE function which is required to obtain data by URL. This function can be used to read files and send files with keys, passwords and anything else. It affects LibreOffice prior to 5.4.5/6.0.1 in all operation systems (GNU/Linux, MS Windows, macOS etc.) and may be embedded in almost all formats supporting by LO.

Recent Exploits: