header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cain & Abel 4.9.56 – Unquoted Service Path

The Cain & Abel version 4.9.56 software on Windows 10 x64 is vulnerable to an unquoted service path vulnerability. The 'Abel' service has a binary path name that is not properly quoted, which could allow an attacker to escalate privileges and execute arbitrary code with the permissions of the LocalSystem account.

Hospital Management System 4.0 – ‘multiple’ SQL Injection

The Hospital Management System v4.0 is suffering from Multiple SQL-Injections via three parameters in function.php, contact.php, and func3.php applications. The attacker can be receiving the all information from the system by using this vulnerability, and also the malicious actor can use sensitive information from the customers of this system. WARNING: If this is in some external domain, or some subdomain, or internal, this will be extremely dangerous!

Servisnet Tessa – MQTT Credentials Dump (Unauthenticated) (Metasploit)

This module exploits MQTT creds dump vulnerability in Servisnet Tessa. The app.js is publicly available which acts as the backend of the application. By exposing a default value for the "Authorization" HTTP header, it is possible to make unauthenticated requests to some areas of the application. Even MQTT(Message Queuing Telemetry Transport) protocol connection information can be obtained with this method. A new admin user can be added to the database with this header obtained in the source code. The module tries to log in to the MQTT service with the credentials it has obtained, and reflects the response it receives from the service.

WordPress Plugin Learnpress 4.1.4.1 – Arbitrary Image Renaming

LearnPress is a WordPress plugin that allows users to create a Learning Management System (LMS). The plugin allows users to upload an image as a profile avatar, which is then cropped and saved. However, there is a vulnerability in the plugin that allows an attacker to rename arbitrary image files by manipulating the POST request sent to the server. This can result in the destruction of website design elements such as banners, avatars, post images, and buttons. The vulnerability can be exploited by registering and logging in to the LearnPress system, uploading an avatar image, intercepting the POST request with a tool like Burpsuite, and changing the value of the `lp-user-avatar-crop[name]` parameter to an arbitrary image file path on the website. The attacker can then forward the modified request and check for the existence of the renamed image file.

Recent Exploits: