This exploit is connected with third part exploit server, which waits for the victim to call him and execute the content from him using the pipe posting method. When the victim hits the button in the Excel file, it makes a POST request to the exploit server, and the server creates another hidden malicious file and executes it directly on the victim's machine. This is a dangerous 0-day exploit.
The WebsiteBaker v2.13.3 application is vulnerable to a directory traversal attack. An attacker can delete arbitrary directories by sending a specially crafted HTTP request to the /admin/media/delete.php endpoint. This can lead to unauthorized access and potential data loss.
The WebsiteBaker application version 2.13.3 is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can upload a specially crafted SVG file containing malicious JavaScript code, which will be executed when a user accesses the file.
The attack itself is carried out locally by a user with authentication to the targeted system. An attacker could exploit the vulnerability by convincing a victim, through social engineering, to download and open a specially crafted file from a website which could lead to a local attack on the victim's computer. The attacker can trick the victim to open a malicious web page by using a malicious 'Word' file for 'Office-365 API'. After the user will open the file to read it, from the API of Office-365, without being asked what it wants to activate, etc, he will activate the code of the malicious server, which he will inject himself, from this malicious server. Emedietly after this click, the attacker can receive very sensitive information! For bank accounts, logs from some sniff attacks, tracking of all the traffic of the victim without stopping, and more malicious stuff, it depends on the scenario and etc.
The application does not sanitize the filename parameter when sending data to /fungsi/edit/edit.php?gambar=user. An attacker can exploit this issue by uploading a PHP file and accessing it, leading to Remote Code Execution.
This exploit allows an attacker to execute arbitrary code on a vulnerable FuguHub server version 8.1. By sending a specially crafted request to the server, an attacker can gain unauthorized access and execute arbitrary commands.
This exploit demonstrates a Cross Site Scripting (XSS) vulnerability in the Sales of Cashier Goods v1.0 web application. By injecting a malicious script, an attacker can execute arbitrary code in the context of the victim's browser.
The Rukovoditel version 3.4.1 is vulnerable to multiple stored cross-site scripting (XSS) attacks. The first XSS vulnerability can be exploited by an authenticated attacker by adding a malicious comment containing an iframe tag with a src attribute pointing to a malicious website. The second XSS vulnerability can be exploited by an authenticated administrator by setting the Copyright Text to a value containing a malicious img tag with an onerror attribute triggering an alert.
The exploit allows an attacker to spoof headers in the Ambari web interface, potentially leading to unauthorized access or other malicious activities.
This exploit allows for privilege escalation in Windows 11 version 22h2. By exploiting a vulnerability in the vulnerable driver, an attacker can elevate their privileges and gain unauthorized access to sensitive system resources. The exploit triggers the vulnerability through a specific IOCTL code, causing the driver to execute malicious code.