header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Art gallery project 1.0 – Arbitrary File Upload (Unauthenticated)

Online Art Gallery Project 1.0 allows unauthenticated users to perform arbitrary file uploads via the adminHome.php page. Due to the absence of an authentication mechanism and inadequate file validation, attackers can upload malicious files, potentially leading to remote code execution and unauthorized access to the server.

Textpattern CMS v4.8.8 – Stored Cross-Site Scripting (XSS) (Authenticated)

The Textpattern CMS v4.8.8 is vulnerable to stored cross-site scripting (XSS) attacks. An authenticated user can inject malicious JavaScript code into the Excerpt field of the Articles section in the admin page. When this payload is executed, it will trigger an alert displaying the user's cookie information.

Xoops CMS 2.5.10 – Stored Cross-Site Scripting (XSS) (Authenticated)

This exploit allows an authenticated user to inject arbitrary HTML or JavaScript code into the Xoops CMS admin panel. By adding a malicious payload in the Category Name field of the Image Manager, an attacker can execute a stored XSS attack. The payload '<script>alert(1)</script>' is used as an example.

projectSend r1605 – Stored XSS

The projectSend application version r1605 is vulnerable to a stored XSS attack. An attacker can exploit this vulnerability by injecting malicious JavaScript code in the Custom Html/Css/Js section. This code will be executed whenever a user visits the affected page, potentially leading to unauthorized actions or data theft.

projectSend r1605 – CSV injection

CSV injection vulnerability in projectSend r1605 allows remote attackers to execute arbitrary commands via a crafted payload in a CSV file. An attacker can exploit this vulnerability by creating a malicious CSV file containing a payload that will be executed when opened by an administrator using the Export action-log functionality.

Anevia Flamingo XL 3.2.9 – Remote Root Jailbreak

Once the admin establishes a secure shell session, she gets dropped into a sandboxed environment using the login binary that allows a specific set of commands. One of those commands that can be exploited to escape the jailed shell is traceroute. A remote attacker can breakout of the restricted environment and have full root access to the device.

Anevia Flamingo XL 3.6.20 – Authenticated Root Remote Code Execution

The affected device suffers from authenticated remote code execution vulnerability. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges.

Recent Exploits: