header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mRemoteNG v1.77.3.1784-NB – Cleartext Storage of Sensitive Information in Memory

mRemoteNG configuration files can be stored in an encrypted state on disk. However, mRemoteNG versions <= v1.76.20 and <= 1.77.3-dev load configuration files in plain text into memory at application start-up, even if no connection has been established yet. This allows attackers to access contents of configuration files in plain text through a memory dump and compromise user credentials. This also bypasses the connection configuration file encryption setting.

copyparty 1.8.2 – Directory Traversal

Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory.

copyparty v1.8.6 – Reflected Cross Site Scripting (XSS)

Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack. Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.

GreenShot 1.2.10 – Insecure Deserialization Arbitrary Code Execution

GreenShot 1.2.10 and below is vulnerable to an insecure object deserialization in its custom *.greenshot format. A stream of .Net object is serialized and insecurely deserialized when a *.greenshot file is open with the software. On a default install, the *.greenshot file extension is associated with the program, so double-click on a *.greenshot file will lead to arbitrary code execution.

October CMS v3.4.4 – Stored Cross-Site Scripting (XSS) (Authenticated)

An authenticated user with file upload authority can upload a specially crafted SVG file containing a malicious JavaScript payload. When the file is accessed from the directory, the payload is executed, resulting in a cross-site scripting (XSS) attack.

Recent Exploits: