header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pyro CMS 3.9 – Server-Side Template Injection (SSTI) (Authenticated)

This exploit allows an authenticated user to execute arbitrary commands on the server. By editing the role 1 and injecting a command in the description, the command is executed when the description is rendered. This can lead to remote code execution.

WordPress Plugin Forminator 1.24.6 – Unauthenticated Remote Command Execution

This exploit allows an attacker to execute remote commands without authentication in the WordPress Plugin Forminator version 1.24.6. The vulnerability is due to improper handling of user input in the 'postdata-1-post-image' parameter, which can be exploited to execute arbitrary PHP code.

Webedition CMS v2.9.8.8 – Remote Code Execution (RCE)

This exploit allows an attacker to execute arbitrary code on a remote system running Webedition CMS v2.9.8.8. By injecting malicious PHP code into the Description area of a new Webedition page, an attacker can execute system commands, such as reading sensitive files like /etc/passwd. The exploit requires the attacker to have login credentials.

Recent Exploits: