header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Admin Bar & Dashboard Access Control 1.2.8 Stored Cross-Site Scripting (XSS)

An attacker can inject malicious scripts into the 'Dashboard Redirect' field of WordPress Plugin Admin Bar & Dashboard Access Control version 1.2.8. When a user triggers the stored payload, the injected JavaScript executes, leading to a successful XSS attack.

taskhub 2.8.7 – SQL Injection

SQL injection allows unauthorized access to data, data modification, and application crashing, which can result in financial losses and reputational damage. The vulnerability exists in the 'project', 'status', 'user_id', 'sort', and 'search' GET parameters in the /home/get_tasks_list path of taskhub 2.8.7.

Proxmox VE TOTP Brute Force

The Proxmox VE TOTP Brute Force exploit allows an attacker to perform a brute force attack on the Time-based One-Time Password (TOTP) mechanism used in Proxmox VE. By continuously guessing TOTP codes, an attacker can potentially gain unauthorized access to the system. This vulnerability has been assigned the CVE ID CVE-2023-43320.

Lot Reservation Management System Unauthenticated File Upload and Remote Code Execution

Lot Reservation Management System allows unauthenticated users to upload files, leading to remote code execution. This could potentially result in unauthorized access to the system and sensitive information.

R Radio Network FM Transmitter 1.07 system.cgi Password Disclosure

The R Radio FM Transmitter version 1.07 is vulnerable to an improper access control issue that allows unauthenticated users to access the system.cgi endpoint and reveal the plaintext password of the admin user, facilitating authentication bypass and unauthorized access to FM station setup.

GoAhead Web Server 2.5 – ‘goform/formTest’ Multiple HTML Injection Vulnerabilities

The GoAhead Web Server version 2.5 is vulnerable to multiple HTML injection flaws as it lacks proper input validation. Exploiting this vulnerability allows an attacker to execute malicious HTML code within the context of the affected site.

Recent Exploits: