Vi 漏洞列表
共找到 200 个与 Vi 相关的漏洞
📅 加载漏洞趋势中...
-
Vite 文件读取权限绕过(CVE-2025-46565) 无POC
在版本 6.3.4、6.2.7、6.1.6、5.4.19 和 4.5.14 之前,项目根目录中被文件匹配模式拒绝的文件内容可以返回到浏览器。只有显式将 Vite开发服务器公开给网络的应用程序(使用 --host 或 server.host 配置选项)才会受到影响。只能绕过项目根目录下且被文件匹配模式拒绝的文件。 -
(CVE-2025-36604)Dell Unity OS命令注入漏洞 无POC
(CVE-2025-36604)Dell Unity OS命令注入漏洞 -
万户OA freemarkeService 远程命令执行漏洞 无POC
万户OA存在远程命令执行漏洞,攻击者可以获取服务器权限,执行任意命令。 -
QNAP VioStor 授权问题漏洞 无POC
QNAP VioStor是中国台湾威联通科技(QNAP)公司的一个存储与管理视频监控系统的软件。 QNAP VioStor存在授权问题漏洞,该漏洞源于身份验证不当,可能危及系统安全。 -
QNAP VioStor 路径遍历漏洞 无POC
QNAP VioStor是中国台湾威联通科技(QNAP)公司的一个存储与管理视频监控系统的软件。 QNAP VioStor存在路径遍历漏洞,该漏洞源于容易受到路径遍历攻击,可能导致读取意外文件或系统数据。 -
Ilevia EVE X1 Server /login/login.php 权限绕过漏洞 无POC
Ilevia EVE X1 Server存在权限绕过漏洞,利用此漏洞可控制应用平台,获取服务器敏感信息。 -
(CVE-2025-58751) Vite server.fs 安全绕过漏洞 无POC
(CVE-2025-58751) Vite server.fs 安全绕过漏洞 -
用友NC IMsgCenterWebService 命令执行漏洞 无POC
用友NC是用友公司推出的面向集团企业的高端管理软件,采用J2EE架构和UAP平台开发,整合云计算、移动应用等技术,提供全球化管控、全产业链协同、动态企业建模等功能。用友nc IMsgCenterWebService 存在命令执行漏洞,攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个web服务器。 -
Ilevia EVE X1 Server /ajax/php/dbcheck.php 文件读取漏洞 无POC
Ilevia EVE X1 Server是一个紧凑而多功能的智能建筑自动化解决方案,支持多种协议并提供广泛的定制选项。其 t/ajax/php/dbcheck.php接口存在文件读取漏洞,攻击者可以通过该漏洞读取系统中的敏感文件,导致信息泄露和潜在的安全风险。 -
Ilevia EVE X1 服务器 login.php 身份认证绕过漏洞 无POC
Ilevia EVE X1 服务器 login.php 身份认证绕过漏洞 -
CVE-2017-11610: Supervisor RCE POC
Supervisor是一套进程控制系统,用于监视和控制类Unix系统上的进程。XML-RPC server是其中的一个XML-RPC服务器。 Supervisor中的XML-RPC服务器存在安全漏洞。远程攻击者可借助特制的XML-RPC请求利用该漏洞执行任意命令。 -
CVE-2017-7921: Hikvision CVE-2017-7921 POC
/Security/users?auth=YWRtaW46MTEK /onvif-http/snapshot?auth=YWRtaW46MTEK /System/configurationFile?auth=YWRtaW46MTEK -
CVE-2021-33044: Dahua IPC/VTH/VTO devices Authentication Bypass POC
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. -
CVE-2021-36260: Hikvision IP camera/NVR - Unauthenticated RCE POC
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. -
CVE-2021-43734: kkFileView getCorsFile 任意文件读取漏洞 POC
kkFileView getCorsFile 3.6.0 版本以下存在任意文件读取漏洞,攻击者通过漏洞可以获取服务器中的任意文件,获取服务器敏感信息 FOFA: app="kkFileView" -
CVE-2022-23178: Crestron Device - Credentials Disclosure POC
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields. -
CVE-2022-29303: SolarView Compact conf_mail.php 远程命令执行漏洞 POC
SolarView Compact conf_mail.php 存在远程命令执行漏洞,攻击者通过构造特殊的请求,可以获取服务器权限 body="SolarView Compact" && title=="Top" -
CVE-2022-40881: SolarView network_test.php 远程命令执行漏洞 POC
SolarView network_test.php 存在远程命令执行漏洞,攻击者通过构造特殊的请求,可以获取服务器权限 body="SolarView Compact" && title=="Top" -
CVE-2022-45933: KubeView 未授权访问漏洞 POC
KubeView 0.1.31之前的版本存在安全漏洞,该漏洞源于其api/ scraper /kube-system不需要身份验证,并检索可以作为kube-admin进行身份验证的证书文件允许攻击者获得Kubernetes集群的控制权。 -
CVE-2023-23333: SolarView downloader.php rce POC
There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php. FOFA: SolarView Compact -
CVE-2023-26256: STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion POC
STAGIL Navigation for Jira Menu & Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjFooterNavigationConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks. shodan-query: title:Jira -
CVE-2023-29919: SolarView Compact <= 6.00 - Local File Inclusion POC
There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php shodan-query: http.html:"SolarView Compact" -
CVE-2023-5074: D-Link D-View 8 v2.0.1.28 - Authentication Bypass POC
Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 SHODAN: http.favicon.hash:-1317621215 FOFA: icon_hash="-1317621215" -
CVE-2024-1061: WordPress HTML5 Video Player SQL注入 POC
Fofa: "wordpress" && body="html5-video-player" -
CVE-2025-30208: Vite 任意文件读取漏洞 POC
fofa: body="/@vite/client" -
exacqvision-default-login: ExacqVision Default Login POC
ExacqVision Web Service default login credentials (admin/admin256) were discovered. FOFA: ExacqVision -
exacqvision-default-password: ExacqVision Default Login POC
fafo "ExacqVision" -
hikvision-intercom-service-default-password: Hikvision Intercom Service Default Password POC
app="HIKVISION-群组对讲服务配置平台" admin/12345 -
travis-ci-disclosure: Travis CI Disclosure POC
Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows. -
kkfileview-panel: kkFileView Panel - Detect POC
kkFileView panel was detected. -
sonicwall-sslvpn-panel: SonicWall Virtual Office SSLVPN Panel POC
shodan: http.title:"Virtual Office" -
acti-video-read-file: ACTI 视频监控 images 任意文件读取漏洞 POC
ACTI 视频监控 存在任意文件读取漏洞 app="ACTi-视频监控" -
avideo-install: AVideo Installer - Detect POC
AVideo installer panel was detected. SHODAN: http.title:"AVideo" FOFA: "AVideo" -
glodon-linkworks-gwgdwebservice-sqli: 广联达 Linkworks GWGdWebService SQL 注入 POC
广联达 Linkworks办公OA GWGdWebService接口存在SQL注入漏洞,发送请求包后可以获取数据库中的敏感信息 Fofa: header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx" -
glodon-linkworks-Service.asmx-disclosure: 广联达oa Linkworks Service.asmx 敏感信息泄露 POC
广联达 Linkworks办公OA存在信息泄露,攻击者可通过此漏洞获取网站后台敏感信息。 FOFA: body="/Services/Identification/" HUNTER: web.body="/Services/Identification/" -
hikvision-af-env-info-disclosure: HiKVISION 综合安防管理平台 env 信息泄漏漏洞 POC
HIKVISION 综合安防管理平台存在信息泄漏漏洞,攻击者通过漏洞可以获取环境env等敏感消息进一步攻击 FOFA: app="HIKVISION-综合安防管理平台" -
hikvision-anfang-files-fileupload: HiKVISION 综合安防管理平台 files 任意文件上传 POC
HiKVISION 综合安防管理平台 files 接口存在任意文件上传漏洞,攻击者通过漏洞可以上传任意文件 FOFA: app="HIKVISION-综合安防管理平台" FOFA: title="综合安防管理平台" -
hikvision-anfang-report-fileupload: HiKVISION 综合安防管理平台 report 任意文件上传 POC
HiKVISION 综合安防管理平台 report接口存在任意文件上传漏洞,攻击者通过构造特殊的请求包可以上传任意文件,获取服务器权限 FOFA: app="HIKVISION-综合安防管理平台" FOFA: title="综合安防管理平台" -
hikvision-applyautologinticket-rce: 海康威视综合安防管理平台 applyAutoLoginTicket RCE POC
海康综合安防管理平台 applyAutoLoginTicket 接口存在 fastjson 反序列化漏洞。攻击者可在未鉴权的情况下,对目标服务器进行远程命令执行,从而获取服务器权限。 Fofa: app="HIKVISION-综合安防管理平台" Fofa: icon_hash="136203464" Hunter: web.icon="753466eed2bbef2bae18b55994d1d2ae" -
hikvision-gateway-data-file-read: HIKVISION 视频编码设备接入网关 $DATA 任意文件读取 POC
HIKVISION 视频编码设备接入网关存在配置错误特性,特殊后缀请求php文件可读取源码 title="视频编码设备接入网关" -
hikvision-ivms-8700-fileread: HIKVISION iVMS-8700综合安防管理平台 download 任意文件下载 POC
HIKVISION iVMS-8700综合安防管理平台存在任意文件读取漏洞,攻击者通过发送特定的请求包可以读取服务器中的敏感文件获取服务器信息 Fofa: icon_hash="-911494769" -
hikvision-ivms-8700-upload-action-upload: HIKVISION iVMS-8700综合安防管理平台 download 任意文件下载 POC
HIKVISION iVMS-8700综合安防管理平台存在任意文件上传漏洞,攻击者通过发送特定的请求包可以上传Webshell文件控制服务器 FOFA: icon_hash="-911494769" -
hikvision-showfile-file-read: HIKVISION 视频编码设备接入网关 showFile.php 任意文件下载漏洞 POC
海康威视视频接入网关系统在页面/serverLog/showFile.php的参数fileName存在任意文件下载漏洞 title="视频编码设备接入网关" -
idocview-2word-fileupload: I Doc View /html/2word 任意文件上传漏洞 POC
Fofa: title=="在线文档预览 - I Doc View" -
idocview-fileread: I Doc View任意文件读取漏洞 POC
Fofa: title=="在线文档预览 - I Doc View" -
idocview-qjvqhft-fileread: IDocView在线文档预览系统qJvqhFt任意文件读取 POC
IDocView在线文档预览系统qJvqhFt任意文件读取 1.通过上述poc获取uuid值 2.访问url+/view/uuid读取文件内容 Fofa: title=="在线文档预览 - I Doc View" -
jindie-yunxingkong-dynamicformservice-rce: 金蝶云星空DynamicFormService.CloseForm.common.kdsvc远程代码执行漏洞 POC
Kingdee.BOS.ServiceFacade.ServicesStub.DynamicForm.DynamicFormService.CloseForm.common.kdsvc接口处存在远程代码执行漏洞,未经身份验证的远程攻击者可利用此漏洞执行任意系统命令,写入后门文件,获取服务器权限 Fofa: app="金蝶云星空-管理中心" -
kkfileview-upload-xss: kkFileView Upload - XSS POC
kkFileView panel was detected. -
landray-oa-kmImeetingResWebService-fileread: Landray OA kmImeetingResWebService File Read POC
Landray OA System kmImeetingResWebService interface has an arbitrary file read vulnerability. The vulnerability exists in the getKmimeetingResById method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter" -
landray-oa-sysNotifyTodoWebService-fileread: Landray OA sysNotifyTodoWebService File Read POC
Landray OA System sysNotifyTodoWebService interface has an arbitrary file read vulnerability. The vulnerability exists in the getTodoCount method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter" -
landray-oa-sysNotifyTodoWebServiceEkpj-fileread: Landray OA sysNotifyTodoWebServiceEkpj File Read POC
Landray OA System sysNotifyTodoWebServiceEkpj interface has an arbitrary file read vulnerability. The vulnerability exists in the getAllTodoId method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter" -
landray-oa-sysTagWebService-fileread: Landray OA sysTagWebService File Read POC
Landray OA System sysTagWebService interface has an arbitrary file read vulnerability. The vulnerability exists in the getGroups method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter" -
landray-oa-thirdImSyncForKKWebService-fileread: Landray OA thirdImSyncForKKWebService File Read POC
Landray EKP System sysFormMainDataInsystemWebservice interface has an arbitrary file read vulnerability. FOFA: body="Com_Parameter" -
landray-oa-wechatWebserviceService-fileread: Landray OA wechatWebserviceService File Read POC
Landray OA System wechatWebserviceService interface has an arbitrary file read vulnerability. The vulnerability exists in the getAttachement method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter" -
metadata-service-openstack: Openstack Metadata Service Check POC
The Openstack host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. -
newcapec-service-action-rce: 新开普 前置服务管理平台 service.action 远程命令执行漏洞 POC
新开普 前置服务管理平台 service.action 接口存在远程命令执行漏洞,攻击者通过漏洞可以获取服务器权限 FOFA: title="掌上校园服务管理平台" -
uniview-isc-logreport-php-rce: 浙江宇视科技 网络视频录像机 ISC LogReport.php 远程命令执行漏洞 POC
浙江宇视科技 网络视频录像机 ISC /Interface/LogReport/LogReport.php 页面,fileString 参数过滤不严格,导致攻击者可执行任意命令 app="uniview-ISC" -
wanhu-oa-rhinoscript-engineservice-rce: 万户OA-RhinoScriptEngineService命令执行 POC
Fofa: app="万户网络-ezOFFICE" -
wanhu-oa-tele-conference-service-xxe: 万户OA TeleConferenceService XXE注入漏洞 POC
万户OA TeleConferenceService接口存在XXE注入漏洞,攻击者通过漏洞可以继续XXE注入获取服务器敏感信息 app="万户网络-ezOFFICE" -
yonyou-nc-portalsesInittoolservice-disclosure: 用友 portalsesInittoolservice 泄露数据库账号密码 POC
用友 portalsesInittoolservice 泄露数据库账号密码 fofa: app="用友-UFIDA-NC" -
yonyou-nccloud-iupdateservice-xxe: 用友NC Cloud IUpdateService接口存在XXE漏洞 POC
NC Cloud是用友推出的大型企业数字化平台。 用友网络科技股份有限公司NC Cloud存在任意文件上传漏洞,攻击者可利用该漏洞获取服务器控制权。该系统IUpdateService接口存在实体注入漏洞 Fofa: icon_hash="1085941792" -
yunanbao-authservice-fastjson-rce: 云匣子 FastJson反序列化RCE漏洞 POC
云匣子authService接口处使用存在漏洞 fastjson 组件,未授权的攻击者可通过fastjson 序列化漏洞对云匣子发起攻击获取服务器权限 Fofa: app="云安宝-云匣子" ZoomEye: app:"云安宝 云匣子" Hunter: app.name="云安宝·云匣子" -
yunlian-pos-erp-zksrservice-sqli: Yunlian POS-ERP ZksrService SQL Injection POC
Yunlian POS-ERP Management System ZksrService interface has a SQL injection vulnerability. An attacker can execute arbitrary SQL commands through the getItemInfo method. FOFA: title="Powered By chaosZ" -
angjie-crm-rptviewer-ssrf: 昂捷CRM-RptViewer.aspx存在SSRF漏洞 POC
昂捷CRM RptViewer.aspx存在SSRF漏洞,攻击者可以利用该漏洞获取服务器敏感信息。 fofa: (body="CheckSilverlightInstalled()" && body="AllowHtmlPopupwindow") || body="/ClientBin/slEnjoy.App.xap" -
Ilevia EVE X1 Server /ajax/php/login.php 命令执行漏洞 无POC
Ilevia EVE X1 Server 是一款智能家居管理系统。该漏洞存在于 login.php 文件中,攻击者可以通过发送特制的请求,利用命令注入漏洞执行任意命令,可能导致服务器被完全控制、数据泄露和系统崩溃等严重后果。 -
Ilevia EVE X1 Server /80-history/eve-server.log 信息泄露漏洞 无POC
When an attacker accesses the /80-history/eve-server.log path, it leads to the disclosure of the eve-server.log file content, resulting in information leakage. -
Network Technologies Inc ENVIROMUX存在默认口令 无POC
Network Technologies IncENVIROMUX存在默认口令,攻击者通过接口登录获得sessionId后,将sessionId设置到浏览器cookie中,刷新首页可以直接登录成功。 -
VICIdial /VERM/VERM_AJAX_functions.php SQL 注入漏洞(CVE-2024-8503) 无POC
VICIdial是一款开源的呼叫中心解决方案,广泛应用于客户服务和电话营销领域。VICIdial的 /VERM/VERM_AJAX_functions.php 接口存在SQL注入漏洞,未经身份验证的攻击者可以利用该漏洞通过基于时间的SQL注入枚举数据库记录。默认情况下,VICIdial会在数据库中存储明文凭据,攻击者可能通过该漏洞获取敏感信息,导致系统安全性受到严重威胁。 -
Ilevia EVE X1 Server 存在信息泄露漏洞 无POC
Ilevia EVE X1 Server存在信息泄露漏洞,利用此漏洞可获取服务器敏感信息,如管理员账号密码,可直接获取后台权限。 -
ilevia EVE X1 Server get_file_content 接口存在任意文件读取漏洞 无POC
ilevia EVE X1 Server get_file_content接口存在任意文件读取漏洞,该漏洞允许攻击者通过构造特定的请求,访问系统中任意文件。攻击者可利用该漏洞获取敏感信息,如配置文件、用户数据或系统关键文件,从而对服务器的安全性造成威胁。由于缺乏适当的输入验证和权限控制,这一漏洞可能导致敏感数据泄露和系统被恶意操控。 -
InvisionCommunity存在代码注入漏洞(CVE-2025-47916) 无POC
Invision Community 5.0.0 至 5.0.7 版本之前,可通过向 themeeditor.php传入精心构造的模板字符串实现远程代码执行。攻击者可以获取服务器权限 -
Ilevia EVE X1 Server存在任意文件读取漏洞 无POC
Ilevia EVE X1 Server存在任意文件读取,利用此漏洞可获取服务器敏感信息。 -
Ilevia EVE X1 Server存在远程命令执行 无POC
Ilevia EVE X1 Server存在远程命令执行,利用此漏洞可获取服务器权限。 -
Richmail 邮件系统openapiservice 存在任意文件上传漏洞 无POC
文件上传漏洞发生在应用程序允许用户上传文件的功能中,如果上传功能未能正确地验证和限制上传文件的类型和内容,攻击者可能利用此漏洞上传恶意文件,如包含可执行代码的脚本文件,从而在服务器上执行任意命令,控制或破坏系统。 -
CVE-2024-12356: Privileged Remote Access & Remote Support - Command Injection POC
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. -
CVE-2010-2918: Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion POC
A PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. -
CVE-2013-4117: WordPress Plugin Category Grid View Gallery 2.3.1 - Cross-Site Scripting POC
A cross-site scripting vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter. -
CVE-2014-4536: Infusionsoft Gravity Forms Add-on < 1.5.7 - Cross-Site Scripting POC
Multiple cross-site scripting vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter. -
CVE-2014-4539: Movies <= 0.6 - Cross-Site Scripting POC
A cross-site scripting vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php. -
CVE-2015-2807: Navis DocumentCloud <0.1.1 - Cross-Site Scripting POC
Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter. -
CVE-2015-2863: Kaseya Virtual System Administrator - Open Redirect POC
Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. -
CVE-2015-4455: WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload POC
Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary. -
CVE-2015-5354: Novius OS 5.0.1-elche - Open Redirect POC
Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login. -
CVE-2016-1000134: WordPress HDW Video Gallery <=1.2 - Cross-Site Scripting POC
WordPress HDW Video Gallery 1.2 and before contains a cross-site scripting vulnerability via playlist.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2016-1000135: WordPress HDW Video Gallery <=1.2 - Cross-Site Scripting POC
WordPress HDW Video Gallery 1.2 and before contains a cross-site scripting vulnerability via mychannel.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2016-1000139: WordPress Infusionsoft Gravity Forms <=1.5.11 - Cross-Site Scripting POC
WordPress plugin Infusionsoft 1.5.11 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2016-1000148: WordPress S3 Video <=0.983 - Cross-Site Scripting POC
WordPress S3 Video and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2016-10367: Opsview Monitor Pro - Local File Inclusion POC
Opsview Monitor Pro prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch is vulnerable to unauthenticated local file inclusion and can be exploited by issuing a specially crafted HTTP GET request utilizing a simple bypass. -
CVE-2016-10368: Opsview Monitor Pro - Open Redirect POC
Opsview Monitor Pro before 5.1.0.162300841, before 5.0.2.27475, before 4.6.4.162391051, and 4.5.x without a certain 2016 security patch contains an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the login URI. -
CVE-2017-11512: ManageEngine ServiceDesk 9.3.9328 - Arbitrary File Retrieval POC
ManageEngine ServiceDesk 9.3.9328 is vulnerable to an arbitrary file retrieval due to improper restrictions of the pathname used in the name parameter for the download-snapshot path. An unauthenticated remote attacker can use this vulnerability to download arbitrary files. -
CVE-2017-18537: Visitors Online by BestWebSoft < 1.0.0 - Cross-Site Scripting POC
The visitors-online plugin before 1.0.0 for WordPress has multiple XSS issues. -
CVE-2017-18562: Error Log Viewer by BestWebSoft < 1.0.6 - Cross-Site Scripting POC
The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues. -
CVE-2017-7921: Hikvision - Authentication Bypass POC
Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices contain an improper authentication issue. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information. -
CVE-2018-10562: Dasan GPON Devices - Remote Code Execution POC
Dasan GPON home routers are susceptible to command injection which can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. -
CVE-2018-10818: LG NAS Devices - Remote Code Execution POC
LG NAS devices contain a pre-auth remote command injection via the "password" parameter. -
CVE-2018-11231: Opencart Divido - Sql Injection POC
OpenCart Divido plugin is susceptible to SQL injection -
CVE-2018-1207: Dell iDRAC7/8 Devices - Remote Code Injection POC
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code. -
CVE-2019-12581: Zyxel ZyWal/USG/UAG Devices - Cross-Site Scripting POC
Zyxel ZyWall, USG, and UAG devices allow remote attackers to inject arbitrary web script or HTML via the err_msg parameter free_time_failed.cgi CGI program, aka reflective cross-site scripting. -
CVE-2019-16931: WordPress Visualizer <3.3.1 - Cross-Site Scripting POC
WordPress Visualizer plugin before 3.3.1 contains a stored cross-site scripting vulnerability via /wp-json/visualizer/v1/update-chart WP-JSON API endpoint. An unauthenticated attacker can execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. -
CVE-2019-16932: Visualizer <3.3.1 - Blind Server-Side Request Forgery POC
Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint. -
CVE-2019-5434: Revive Adserver 4.2 - Remote Code Execution POC
Revive Adserver 4.2 is susceptible to remote code execution. An attacker can send a crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. This can be exploited to perform various types of attacks, e.g. serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third-party websites. -
CVE-2020-0618: Microsoft SQL Server Reporting Services - Remote Code Execution POC
Microsoft SQL Server Reporting Services is vulnerable to a remote code execution vulnerability because it incorrectly handles page requests. -
CVE-2020-15415: DrayTek Vigor - Command Injection POC
DrayTek Vigor devices contain a command injection vulnerability in the cvmcfgupload functionality. The vulnerability allows remote attackers to execute arbitrary commands through specially crafted requests to the /cgi-bin/mainfunction.cgi/cvmcfgupload endpoint. -
CVE-2020-27361: Akkadian Provisioning Manager 4.50.02 - Sensitive Information Disclosure POC
Akkadian Provisioning Manager 4.50.02 could allow viewing of sensitive information within the /pme subdirectories. -
CVE-2020-28351: Mitel ShoreTel 19.46.1802.0 Devices - Cross-Site Scripting POC
Mitel ShoreTel 19.46.1802.0 devices and their conference component are vulnerable to an unauthenticated attacker conducting reflected cross-site scripting attacks via the PATH_INFO variable to index.php due to insufficient validation for the time_zone object in the HOME_MEETING& page. -
CVE-2020-8115: Revive Adserver <=5.0.3 - Cross-Site Scripting POC
Revive Adserver 5.0.3 and prior contains a reflected cross-site scripting vulnerability in the publicly accessible afr.php delivery script. In older versions, it is possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script is printed back without proper escaping, allowing an attacker to execute arbitrary JavaScript code on the browser of the victim. -
CVE-2020-9047: exacqVision Web Service - Remote Code Execution POC
exacqVision Web Service is susceptible to remote code execution which could allow the execution of unauthorized code or operating system commands on systems running exacqVision Web Service versions 20.06.3.0 and prior and exacqVision Enterprise Manager versions 20.06.4.0 and prior. An attacker with administrative privileges could potentiallydownload and run a malicious executable that could allow OS command injection on the system. -
CVE-2020-9376: D-Link DIR-610 Devices - Information Disclosure POC
D-Link DIR-610 devices allow information disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. -
CVE-2021-20123: Draytek VigorConnect 1.6.0-B - Local File Inclusion POC
Draytek VigorConnect 1.6.0-B3 is susceptible to local file inclusion in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. -
CVE-2021-20124: Draytek VigorConnect 6.0-B3 - Local File Inclusion POC
Draytek VigorConnect 1.6.0-B3 is susceptible to local file inclusion in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. -
CVE-2021-21978: VMware View Planner <4.6 SP1- Remote Code Execution POC
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. -
CVE-2021-22873: Revive Adserver <5.1.0 - Open Redirect POC
Revive Adserver before 5.1.0 contains an open redirect vulnerability via the dest, oadest, and ct0 parameters of the lg.php and ck.php delivery scripts. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. -
CVE-2021-24498: WordPress Calendar Event Multi View <1.4.01 - Cross-Site Scripting POC
WordPress Calendar Event Multi View plugin before 1.4.01 contains an unauthenticated reflected cross-site scripting vulnerability. It does not sanitize or escape the 'start' and 'end' GET parameters before outputting them in the page (via php/edit.php). -
CVE-2021-24750: WordPress Visitor Statistics (Real Time Traffic) <4.8 -SQL Injection POC
WordPress Visitor Statistics (Real Time Traffic) plugin before 4.8 does not properly sanitize and escape the refUrl in the refDetails AJAX action, which is available to any authenticated user. This could allow users with a role as low as subscriber to perform SQL injection attacks. -
CVE-2021-24934: Visual CSS Style Editor < 7.5.4 - Cross-Site Scripting POC
The plugin does not sanitise and escape the wyp_page_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue -
CVE-2021-24970: WordPress All-In-One Video Gallery <2.5.0 - Local File Inclusion POC
WordPress All-in-One Video Gallery plugin before 2.5.0 is susceptible to local file inclusion. The plugin does not sanitize and validate the tab parameter before using it in a require statement in the admin dashboard. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations. -
CVE-2021-28149: Hongdian H8922 3.0.5 Devices - Local File Inclusion POC
Hongdian H8922 3.0.5 devices are vulnerable to local file inclusion. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. -
CVE-2021-28854: VICIdial Sensitive Information Disclosure POC
VICIdial's Web Client is susceptible to information disclosure because it contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems. -
CVE-2021-31581: Akkadian Provisioning Manager - Information Disclosure POC
Akkadian Provisioning Manager is susceptible to information disclosure. The restricted shell provided can be escaped by abusing the Edit MySQL Configuration command. This command launches a standard VI editor interface which can then be escaped. -
CVE-2021-33904: Accela Civic Platform <=21.1 - Cross-Site Scripting POC
Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via the security/hostSignon.do parameter servProvCode. -
CVE-2021-34370: Accela Civic Platform <=21.1 - Cross-Site Scripting POC
Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL. -
CVE-2021-36260: Hikvision IP camera/NVR - Remote Command Execution POC
Certain Hikvision products contain a command injection vulnerability in the web server due to the insufficient input validation. An attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. -
CVE-2021-36356: Kramer VIAware - Remote Code Execution POC
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames. -
CVE-2021-37416: Zoho ManageEngine ADSelfService Plus <=6103 - Cross-Site Scripting POC
Zoho ManageEngine ADSelfService Plus 6103 and prior contains a reflected cross-site scripting vulnerability on the loadframe page. -
CVE-2021-37589: Virtua Software Cobranca <12R - Blind SQL Injection POC
Virtua Cobranca before 12R allows blind SQL injection on the login page. -
CVE-2021-39350: FV Flowplayer Video Player WordPress plugin - Authenticated Cross-Site Scripting POC
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts in versions 7.5.0.727 - 7.5.2.727. -
CVE-2021-40539: Zoho ManageEngine ADSelfService Plus v6113 - Unauthenticated Remote Command Execution POC
Zoho ManageEngine ADSelfService Plus version 6113 and prior are vulnerable to a REST API authentication bypass vulnerability that can lead to remote code execution. -
CVE-2021-40870: Aviatrix Controller 6.x before 6.5-1804.1922 - Remote Command Execution POC
Aviatrix Controller 6.x before 6.5-1804.1922 contains a vulnerability that allows unrestricted upload of a file with a dangerous type, which allows an unauthenticated user to execute arbitrary code via directory traversal. -
CVE-2021-42071: Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection POC
Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. -
CVE-2021-43734: kkFileview v4.0.0 - Local File Inclusion POC
kkFileview v4.0.0 is vulnerable to local file inclusion which may lead to a sensitive file leak on a related host. -
CVE-2021-44077: Zoho ManageEngine ServiceDesk Plus - Remote Code Execution POC
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. -
CVE-2021-44529: Ivanti EPM Cloud Services Appliance Code Injection POC
Ivanti EPM Cloud Services Appliance (CSA) before version 4.6.0-512 is susceptible to a code injection vulnerability because it allows an unauthenticated user to execute arbitrary code with limited permissions (nobody). -
CVE-2021-44848: Thinfinity VirtualUI User Enumeration POC
Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) -
CVE-2021-46068: Vehicle Service Management System - Stored Cross-Site Scripting POC
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. -
CVE-2021-46069: Vehicle Service Management System 1.0 - Stored Cross Site Scripting POC
Vehicle Service Management System 1.0 contains a stored cross-site scripting vulnerability via the Mechanic List section in login panel. -
CVE-2021-46071: ehicle Service Management System 1.0 - Cross-Site Scripting POC
Vehicle Service Management System 1.0 contains a stored cross-site scripting vulnerability via the Category List section in login panel. -
CVE-2021-46072: Vehicle Service Management System 1.0 - Stored Cross Site Scripting POC
Vehicle Service Management System 1.0 contains a stored cross-site scripting vulnerability via the Service List section in login panel. -
CVE-2021-46073: Vehicle Service Management System 1.0 - Cross Site Scripting POC
Vehicle Service Management System 1.0 contains a cross-site scripting vulnerability via the User List section in login panel. -
CVE-2022-0140: WordPress Visual Form Builder <3.0.8 - Information Disclosure POC
WordPress Visual Form Builder plugin before 3.0.8 contains a information disclosure vulnerability. The plugin does not perform access control on entry form export, allowing an unauthenticated user to export the form entries as CSV files using the vfb-export endpoint. -
CVE-2022-0786: WordPress KiviCare <2.3.9 - SQL Injection POC
WordPress KiviCare plugin before 2.3.9 contains a SQL injection vulnerability. The plugin does not sanitize and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2022-0826: WordPress WP Video Gallery <=1.7.1 - SQL Injection POC
WordPress WP Video Gallery plugin through 1.7.1 contains a SQL injection vulnerability. The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2022-1026: Kyocera Net View Address Book Exposure POC
Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function. -
CVE-2022-1392: WordPress Videos sync PDF <=1.7.4 - Local File Inclusion POC
WordPress Videos sync PDF 1.7.4 and prior does not validate the p parameter before using it in an include statement, which could lead to local file inclusion. -
CVE-2022-22242: Juniper Web Device Manager - Cross-Site Scripting POC
Juniper Web Device Manager (J-Web) in Junos OS contains a cross-site scripting vulnerability. This can allow an unauthenticated attacker to run malicious scripts reflected off J-Web to the victim's browser in the context of their session within J-Web, which can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue affects all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. -
CVE-2022-23178: Crestron Device - Credentials Disclosure POC
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields. -
CVE-2022-24627: AudioCodes Device Manager Express - SQL Injection POC
An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is an unauthenticated SQL injection in the p parameter of the process_login.php login form. -
CVE-2022-24681: ManageEngine ADSelfService Plus <6121 - Stored Cross-Site Scripting POC
ManageEngine ADSelfService Plus before 6121 contains a stored cross-site scripting vulnerability via the welcome name attribute to the Reset Password, Unlock Account, or User Must Change Password screens. -
CVE-2022-24900: Piano LED Visualizer 1.3 - Local File Inclusion POC
Piano LED Visualizer 1.3 and prior are vulnerable to local file inclusion. -
CVE-2022-2633: All-In-One Video Gallery <=2.6.0 - Server-Side Request Forgery POC
WordPress All-in-One Video Gallery plugin through 2.6.0 is susceptible to arbitrary file download and server-side request forgery (SSRF) via the 'dl' parameter found in the ~/public/video.php file. An attacker can download sensitive files hosted on the affected server and forge requests to the server. -
CVE-2022-2756: Kavita <0.5.4.1 - Server-Side Request Forgery POC
Kavita before 0.5.4.1 is susceptible to server-side request forgery in GitHub repository kareadita/kavita. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2022-28117: Navigate CMS 2.9.4 - Server-Side Request Forgery POC
Navigate CMS 2.9.4 is susceptible to server-side request forgery via feed_parser class. This can allow a remote attacker to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter, thus enabling possible theft of sensitive information, data modification, and/or unauthorized operation execution. -
CVE-2022-2863: WordPress WPvivid Backup <0.9.76 - Local File Inclusion POC
WordPress WPvivid Backup version 0.9.76 is vulnerable to local file inclusion because the plugin does not sanitize and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server. -
CVE-2022-29298: SolarView Compact 6.00 - Local File Inclusion POC
SolarView Compact 6.00 is vulnerable to local file inclusion which could allow attackers to access sensitive files. -
CVE-2022-29299: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting POC
SolarView Compact version 6.00 contains a cross-site scripting vulnerability in the 'time_begin' parameter to Solar_History.php. -
CVE-2022-29301: SolarView Compact 6.00 - 'pow' Cross-Site Scripting POC
SolarView Compact version 6.00 contains a cross-site scripting vulnerability in the 'pow' parameter to Solar_SlideSub.php. -
CVE-2022-29303: SolarView Compact 6.00 - OS Command Injection POC
SolarView Compact 6.00 was discovered to contain a command injection vulnerability via conf_mail.php. -
CVE-2022-29349: kkFileView 4.0.0 - Cross-Site Scripting POC
kkFileView 4.0.0 contains multiple cross-site scripting vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java. -
CVE-2022-31373: SolarView Compact 6.00 - Cross-Site Scripting POC
SolarView Compact 6.00 contains a cross-site scripting vulnerability via Solar_AiConf.php. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2022-32770: WWBN AVideo 11.6 - Cross-Site Scripting POC
WWBN AVideo 11.6 contains a cross-site scripting vulnerability in the footer alerts functionality via the 'toast' parameter, which is inserted into the document with insufficient sanitization. -
CVE-2022-32771: WWBN AVideo 11.6 - Cross-Site Scripting POC
WWBN AVideo 11.6 contains a cross-site scripting vulnerability in the footer alerts functionality via the 'success' parameter, which is inserted into the document with insufficient sanitization. -
CVE-2022-32772: WWBN AVideo 11.6 - Cross-Site Scripting POC
WWBN AVideo 11.6 contains a cross-site scripting vulnerability in the footer alerts functionality via the 'msg' parameter, which is inserted into the document with insufficient sanitization. -
CVE-2022-33119: NUUO NVRsolo Video Recorder 03.06.02 - Cross-Site Scripting POC
NUUO NVRsolo Video Recorder 03.06.02 contains a reflected cross-site scripting vulnerability via login.php. -
CVE-2022-33965: WordPress Visitor Statistics <=5.7 - SQL Injection POC
WordPress Visitor Statistics plugin through 5.7 contains multiple unauthenticated SQL injection vulnerabilities. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2022-35151: kkFileView 4.1.0 - Cross-Site Scripting POC
kkFileView 4.1.0 contains multiple cross-site scripting vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java. -
CVE-2022-38463: ServiceNow - Cross-Site Scripting POC
ServiceNow through San Diego Patch 4b and Patch 6 contains a cross-site scripting vulnerability in the logout functionality, which can enable an unauthenticated remote attacker to execute arbitrary JavaScript. -
CVE-2022-39048: ServiceNow - Cross-site Scripting POC
A XSS vulnerability was identified in the ServiceNow UI page assessment_redirect. To exploit this vulnerability, an attacker would need to persuade an authenticated user to click a maliciously crafted URL. Successful exploitation potentially could be used to conduct various client-side attacks, including, but not limited to, phishing, redirection, theft of CSRF tokens, and use of an authenticated user's browser or session to attack other systems. -
CVE-2022-40879: kkFileView 4.1.0 - Cross-Site Scripting POC
kkFileView 4.1.0 contains multiple cross-site scripting vulnerabilities via the errorMsg parameter. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2022-40881: SolarView 6.00 - Remote Command Execution POC
SolarView Compact 6.00 is vulnerable to a command injection via network_test.php. -
CVE-2022-43140: kkFileView 4.1.0 - Server-Side Request Forgery POC
kkFileView 4.1.0 is susceptible to server-side request forgery via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. An attacker can force the application to make arbitrary requests via injection of crafted URLs into the url parameter and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2022-45933: KubeView <=0.1.31 - Information Disclosure POC
KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. -
CVE-2022-46934: kkFileView 4.1.0 - Cross-Site Scripting POC
kkFileView 4.1.0 is susceptible to cross-site scripting via the url parameter at /controller/OnlinePreviewController.java. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2023-0600: WP Visitor Statistics (Real Time Traffic) < 6.9 - SQL Injection POC
The plugin does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks. -
CVE-2023-1408: Video List Manager <= 1.7 - SQL Injection POC
The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. -
CVE-2023-23333: SolarView Compact 6.00 - OS Command Injection POC
SolarView Compact 6.00 was discovered to contain a command injection vulnerability, attackers can execute commands by bypassing internal restrictions through downloader.php. -
CVE-2023-2624: KiviCare WordPress Plugin - Cross-Site Scripting POC
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape the 'filterType' parameter, leading to Reflected Cross-Site Scripting. -
CVE-2023-26255: STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion POC
STAGIL Navigation for Jira Menu & Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjCustomDesignConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2023-26256: STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion POC
STAGIL Navigation for Jira Menu & Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjFooterNavigationConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks. -
CVE-2023-27482: Home Assistant Supervisor - Authentication Bypass POC
Home Assistant Supervisor is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered.This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. -
CVE-2023-29919: SolarView Compact <= 6.00 - Local File Inclusion POC
There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php -
CVE-2023-30868: Tree Page View Plugin < 1.6.7 - Cross-Site Scripting POC
The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed. -
CVE-2023-34124: SonicWall GMS and Analytics Web Services - Shell Injection POC
The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions -
CVE-2023-36844: Juniper Devices - Remote Code Execution POC
Multiple cves in Juniper Network (CVE-2023-36844|CVE-2023-36845|CVE-2023-36846|CVE-2023-36847).A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environments variables. Utilizing a crafted request an attacker is able to modify certain PHP environments variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. -
CVE-2023-3722: Avaya Aura Device Services - OS Command Injection POC
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier. -
CVE-2023-38040: Revive Adserver 5.4.1 - Cross-Site Scripting POC
A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions. -
CVE-2023-4113: PHPJabbers Service Booking Script 1.0 - Cross Site Scripting POC
A vulnerability was found in PHP Jabbers Service Booking Script 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be initiated remotely. -
CVE-2023-45852: Viessmann Vitogate 300 - Remote Code Execution POC
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method. -
CVE-2023-48728: WWBN AVideo 11.6 - Cross-Site Scripting POC
A reflected XSS vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff, allowing arbitrary Javascript execution. -
CVE-2023-5074: D-Link D-View 8 v2.0.1.28 - Authentication Bypass POC
Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 -
CVE-2023-5222: Viessmann Vitogate 300 - Hardcoded Password POC
A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface. -
CVE-2023-6895: Hikvision IP ping.php - Command Execution POC
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability. -
CVE-2024-1061: WordPress HTML5 Video Player - SQL Injection POC
WordPress HTML5 Video Player plugin is vulnerable to SQL injection. An unauthenticated attacker can exploit this vulnerability to perform SQL injection attacks. -
CVE-2024-11728: KiviCare Clinic & Patient Management System (EHR) <= 3.6.4 - SQL Injection POC
The KiviCare Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-12849: Error Log Viewer By WP Guru <= 1.0.1.3 - Missing Authorization to Arbitrary File Read POC
The Error Log Viewer By WP Guru plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1.3 via the wp_ajax_nopriv_elvwp_log_download AJAX action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. -
CVE-2024-12987: DrayTek Vigor - Command Injection POC
DrayTek Gateway devices (Vigor2960, Vigor300B, etc.) are vulnerable to command injection via the session parameter in the /cgi-bin/mainfunction.cgi/apmcfgupload endpoint. An attacker can inject arbitrary commands and retrieve their output. -
CVE-2024-13624: WordPress WPMovieLibrary Plugin <= 2.1.4.8 - Cross-Site Scripting POC
The WPMovieLibrary WordPress plugin through version 2.1.4.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'order' parameter in the import page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. -
CVE-2024-3850: Uniview NVR301-04S2-P4 - Cross-Site Scripting POC
Uniview NVR301-04S2-P4 contains a reflected cross-site scripting vulnerability via the PATH of LAPI. CISA and Uniview state that this vulnerability needs to be authenticated. This is incorrect. Any PATH payload can cause XSS. A submission to Mitre has been sent to update the verbiage in the finding as well as the CVSS score. -
CVE-2024-38653: Ivanti Avalanche SmartDeviceServer - XML External Entity POC
XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server. -
CVE-2024-40422: Devika v1 - Path Traversal POC
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system. -
CVE-2024-45488: SafeGuard for Privileged Passwords < 7.5.2 - Authentication Bypass POC
One Identity Safeguard for Privileged Passwords before 7.5.2 allows unauthorized access because of an issue related to cookies. This only affects virtual appliance installations (VMware or HyperV). The fixed versions are 7.0.5.1 LTS, 7.4.2, and 7.5.2. -
CVE-2024-47062: Navidrome < 0.53.0 - Authenticated SQL Injection POC
Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped. This behavior can be used to inject arbitrary SQL code (SQL Injection). These vulnerabilities can be used to leak information and dump the contents of the database and have been addressed in release version 0.53.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.