header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TerraMaster TOS 4.2.06 – Unauthenticated Remote Code Execution

This module exploits a unauthenticated command execution vulnerability in TerraMaster TOS. The 'Event' parameter in 'include/makecvs.php' contains a vulnerability. 'filename' is executing command on system during '.csv' creation. In order to do this, it is not necessary to have a session in the application. Therefore an unathenticated user can execute the command on the system.

WordPress Epsilon Framework Multiple Themes – Unauthenticated Function Injection

Fifteen WordPress themes use a vulnerable version of epsilon-framework that is vulnerable to a critical unauthenticated function injection vulnerability, due to the lack of capability and CSRF nonce checks in AJAX actions.

10-Strike Network Inventory Explorer Pro 9.05 – Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in 10-Strike Network Inventory Explorer Pro version 9.05. By sending a specially crafted payload, an attacker can cause a buffer overflow and potentially execute arbitrary code.

Webmin 1.962 – Package Update Escape Bypass RCE (Metasploit)

This module exploits an arbitrary command execution vulnerability in Webmin 1.962 and lower versions. Any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges. It emerged by circumventing the measure taken for CVE-2019-12840. s/(-)|(.)/string/g; escape is not enough for prevention. Therefore, since the package name variable is placed directly in the system command, we can manipulate it using some escape characters that HTTP supports. For example, we can escape control by dropping the command line down one line. We can do this with "%0A" and "%0C" urlencoded row values. Also, for paylad to work correctly, we must add double an ampersand(&&) to the end of the payload (%26%26)

Point of Sale System 1.0 – Multiple Stored XSS

This exploit allows an attacker to execute arbitrary script code in the Point of Sale System 1.0 application. The vulnerability can be triggered by injecting a malicious script in various fields of the application, including the Suppliers, Customers, and Products pages. When the injected script is executed, it can lead to unauthorized access, data theft, or other malicious activities.

Alumni Management System 1.0 – “Course Form” Stored XSS

The Alumni Management System 1.0 is vulnerable to a stored XSS attack in the "Course Form" field. By injecting the payload "<script>alert("course")</script>" as the name of a new course, an attacker can trigger the XSS payload, which will be executed whenever the "Course List" page is accessed.

Recent Exploits: