header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LimeSurvey 4.1.11 – ‘Permission Roles’ Persistent Cross-Site Scripting

A stored cross-site scripting vulnerability exists within the 'Permission Roles' functionality of the LimeSurvey administration panel. The vulnerability is caused by the lack of proper input sanitization of the 'Permissiontemplates[name]' and 'Permissiontemplates[description]' parameters.

WordPress Plugin Drag and Drop File Upload Contact Form 1.3.3.2 – Remote Code Execution

This exploit allows remote attackers to execute arbitrary code on the target system by bypassing the allowed file types and file type sanitization. It can upload a PHP file with a reverse shell and gain unauthorized access.

Joomla! Plugin XCloner Backup 3.5.3 – Local File Inclusion (Authenticated)

The Joomla! Plugin XCloner Backup 3.5.3 allows an authenticated user to include local files on the server by manipulating the 'file' parameter in the 'download' action of the 'admin.cloner.php' file. This can lead to unauthorized access and disclosure of sensitive information.

Synology DiskStation Manager smart.cgi Remote Command Execution

This module exploits a vulnerability found in Synology DiskStation Manager (DSM) versions < 5.2-5967-5, which allows the execution of arbitrary commands under root privileges after website authentication. The vulnerability is located in webman/modules/StorageManager/smart.cgi, which allows appending of a command to the device to be scanned. However, the command with drive is limited to 30 characters. A somewhat valid drive name is required, thus /dev/sd is used, even though it doesn't exist. To circumvent the character restriction, a wget input file is staged in /a, and executed to download our payload to /b. From there the payload is executed. A wfsdelay is required to give time for the payload to download, and the execution of it to run.

VUPlayer 2.49 .m3u – Local Buffer Overflow (DEP,ASLR)

This exploit targets the VUPlayer version 2.49 and takes advantage of a local buffer overflow vulnerability. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested on Windows 7 Professional with ALSR and Full DEP turned ON.

Recent Exploits: