header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mini Mouse 9.3.0 – Local File inclusion / Path Traversal

The Mini Mouse 9.3.0 application is vulnerable to local file inclusion and path traversal. An attacker can exploit this vulnerability to access sensitive files on the target device. This vulnerability allows an attacker to read arbitrary files and potentially execute arbitrary code.

ZBL EPON ONU Broadband Router 1.0 – Remote Privilege Escalation

The limited administrative user (admin:admin) can elevate his/her privileges by sending a HTTP GET request to the configuration backup endpoint or the password page and disclose the http super user password. Once authenticated as super, an attacker will be granted access to additional and privileged functionalities.

SyncBreeze 10.1.16 – XML Parsing Stack-based Buffer Overflow

The exploit allows an attacker to execute arbitrary code by exploiting a stack-based buffer overflow vulnerability in SyncBreeze. By crafting a specially crafted XML file and importing it into the application, the attacker can trigger the overflow and gain control over the program.

Novel Boutique House-plus 3.5.1 – Arbitrary File Download

The Novel Boutique House-plus version 3.5.1 is vulnerable to an arbitrary file download attack. The 'fileDownload' function in the 'FileController.java' file allows an attacker to specify a file path and download arbitrary files from the server. By providing a crafted 'filePath' parameter with directory traversal sequences, an attacker can bypass the file path validation and download sensitive files from the server, such as the '/etc/passwd' file.

Web Wiz NewsPad(TM)

Input passed to the FolderName parameter in "RTE_file_browser.asp" is not properly sanitised before being used. This can be exploited to list directories, list txt and list zip files through directory traversal attacks.Also, "RTE_file_browser.asp" does not check user's session and an unauthenticated attacker can perform this attack.-POC:http://[WebWiz NewsPad]/RTE_file_browser.asp?look=&sub=.....\.....\.....\

GetSimple CMS Custom JS Plugin 0.1 – ‘customhs_js_content’ Cross-Site Request Forgery

Cross-Site Request Forgery (CSRF) vulnerability in Custom JS v0.1 plugin for GetSimple CMS allows remote attackers to inject arbitrary client-side script code into every webpage hosted on the CMS (Persistent Cross-Site Scripting), when an authenticated admin visiting a third-party site.

Web Wiz Rich Text Editor(TM)

Input passed to the FolderName parameter in "RTE_file_browser.asp" is not properly sanitised before being used. This can be exploited to list directories, list txt and list zip files through directory traversal attacks. Also, "RTE_file_browser.asp" does not check user's session and an unauthenticated attacker can perform this attack. Moreover, by using "RTE_popup_save_file.asp" attacker can make his/her HTML or HTM file on the server, so this can be used in XSS attacks or making fake pages.

Recent Exploits: