header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NewsLister – Authenticated Persistent Cross-Site Scripting

The NewsLister application is vulnerable to an authenticated persistent cross-site scripting (XSS) attack. By logging into the admin panel and entering a malicious payload in the title value, an attacker can execute arbitrary JavaScript code when viewing the news.

WonderCMS 3.1.3 – Authenticated SSRF to Remote Remote Code Execution

WonderCMS is vulnerable to SSRF Vulnerability. In order to exploit the vulnerability, an attacker must have a valid authenticated session on the CMS. The theme/plugin installer not sanitize the destination of github/gitlab url, so attacker can pointing te destinaition to localhost. when the attacker can pointing the request to localhost, this lead to SSRF vulnerability. the most high impact lead to RCE with gopher scheme and FastCGI running in port 9000

ElkarBackup 1.3.3 – ‘Policy[name]’ and ‘Policy[Description]’ Stored Cross-site Scripting

The ElkarBackup version 1.3.3 is vulnerable to stored cross-site scripting. An attacker can inject malicious JavaScript code into the 'Policy[name]' and 'Policy[Description]' parameters, which will be executed when the policy is saved. This can lead to the execution of arbitrary code in the context of the victim's browser.

SAP Lumira 1.31 – Stored Cross-Site Scripting

The SAP Lumira version 1.31 and below is vulnerable to stored cross-site scripting (XSS). An attacker can exploit this vulnerability by creating a new variable and injecting malicious scripts into it. When the variable is opened, the script will be executed, allowing the attacker to perform various actions, such as stealing cookies or executing arbitrary code.

Razer Chroma SDK Server 3.16.02 – Race Condition Remote File Execution

Remote attackers can register applications to the Chroma Server. If the attacker has write access to the ProgramData folder where the Chroma Server stores its data, he can exploit a race condition and get the server to execute a binary of his choosing. The attacker will need to pre-create a folder with the same name as the application to be registered in Razer Chroma SDKApps<appname>, and create an exe file with the same application's name in that folder. The Apps folder is user writable and does not require admin privileges. The attacker can keep running the code below to get the Server to execute the file while writing the payload to the target directory with another process (eg samba or ftp) in order to exploit the race condition.

Recent Exploits: