header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WorkTime 10.20 Build 4967 – Unquoted Service Path

The WorkTime software version 10.20 Build 4967 is affected by an unquoted service path vulnerability. The vulnerability allows an attacker with local access to escalate privileges and potentially execute arbitrary code.

Open-AudIT Community 4.2.0 – Cross-Site Scripting (XSS) (Authenticated)

There is an issue with link creation in the GUI with Open-AudIT Community. If a bad value is passed to the routine via a URL, javascript code can be executed. This requires the user be logged in to Open-AudIT Community to trigger.

Projeqtor v9.3.1 – Stored Cross Site Scripting (XSS)

Projeqtor version 9.3.1 suffers from a stored XSS vulnerability via SVG file upload. A low level user can upload svg images that contain malicious Javascript. In this way an attacker can escalate privileges and upload a malicious plugin which results in arbitrary code execution in the server hosting the application.

Virtual Airlines Manager 2.6.2 – ‘multiple’ SQL Injection

The Virtual Airlines Manager version 2.6.2 is vulnerable to multiple SQL Injection attacks. The vulnerability exists in various GET parameters, including notam_id, airport, registry_id, plane_location, hub_id, pilot_id, event_id, and tour_id. An attacker can exploit these parameters to inject malicious SQL queries, potentially leading to unauthorized access, data manipulation, or data disclosure.

SAFARI Montage 8.5 – Reflected Cross Site Scripting (XSS)

The SAFARI Montage version 8.5 is vulnerable to a reflected cross-site scripting (XSS) attack. An attacker can execute arbitrary JavaScript code in the victim's browser by injecting malicious code through the 'redirect.php' parameter 'cmd'. This vulnerability allows the attacker to steal sensitive information, such as session cookies, from the victim.

RiteCMS 3.1.0 – Remote Code Execution (RCE) (Authenticated)

RiteCMS version 3.1.0 and below suffers from a remote code execution in admin panel. An authenticated attacker can upload a php file and bypass the .htacess configuration that deny execution of .php files in media and files directory by default. There are 4 ways of bypassing the current file upload protection to achieve remote code execution.

RiteCMS 3.1.0 – Arbitrary File Deletion (Authenticated)

RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain webserver security mechanisms such as deleting .htaccess file that would deactivate those security constraints.

Recent Exploits: