header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ericsson Network Location MPS – Restrictions Bypass RCE (Meow Variant)

This module exploits an arbitrary command execution vulnerability in Ericsson Network Location Mobile Positioning Systems. The 'export' feature in various parts of the application is vulnerable. It allows command injection with preventions bypass operation.

Gestionale Open 11.00.00 – Local Privilege Escalation

By default, the Authenticated Users group has the modify permission to Gestionale Open folders/files. A low privilege account can rename the mysqld.exe file located in the bin folder and replace it with a malicious file that would connect back to an attacking computer, giving system level privileges. The service running as Local System allows the execution of the malicious file when the computer is restarted. The application also has unquoted service path issues.

Jetty 9.4.37.v20210219 – Information Disclosure

This exploit allows an attacker to retrieve sensitive information from the web.xml file in Jetty 9.4.37.v20210219 and 9.4.38.v20210224 versions. By sending a specially crafted HTTP request, an attacker can access the web.xml file containing configuration details and potentially sensitive information.

NIMax 5.3.1f0 – ‘VISA Alias’ Denial of Service (PoC)

The NIMax software version 5.3.1f0 is vulnerable to a local denial of service (DoS) attack. By adding a specially crafted alias and triggering the 'ok' button, the application crashes, resulting in a denial of service condition. This PoC demonstrates the vulnerability by creating a file with a large number of 'A' characters and using it as a resource name.

Mitsubishi Electric & INEA SmartRTU – Reflected Cross-Site Scripting (XSS)

This exploit allows an attacker to execute arbitrary JavaScript code in the context of a victim's browser. By injecting malicious code into a web page, the attacker can steal sensitive information, perform phishing attacks, or gain unauthorized access to user accounts.

WordPress Plugin Pie Register 3.7.1.4 – Admin Privilege Escalation (Unauthenticated)

The vulnerability allows an unauthenticated attacker to escalate their privileges and gain administrative access. By sending a specially crafted request, the attacker can retrieve the authentication cookies for the admin user.

Online Traffic Offense Management System 1.0 – Privilage escalation (Unauthenticated)

The vulnerabilities in the application allow for:- Reading any PHP file from the server- Saving files to parent and child directories and overwriting files in server- Performing operations by an unauthenticated user with application administrator rights

Google SLO-Generator 2.0.0 – Code Execution

The Google SLO-Generator version 2.0.0 is vulnerable to code execution. This can be exploited by an attacker by crafting a specially crafted YAML file that contains malicious code. When this file is processed by the SLO-Generator, it will execute the code within the 'apply:os.system' field. This allows an attacker to execute arbitrary commands on the host system.

Recent Exploits: